More and more businesses are moving to cloud apps like Salesforce, Microsoft Office 365 and Dropbox from traditional in-house managed systems. While offering reduced costs and effect in managing these environment, security controls often lag behind. GDPR regulations introduced in May 2018 mean that positive control over where data is...


Gone Phishin'
I really like the language used by hackers to describe their activities. Terms such as Pwnd, Doxing, Whaling, Spamming, Spoofing and many more are the lexicon of their trade. The term phishing is thought to have first been coined in the mid 90's by hackers stealing accounts and passwords. In...

Common problems when it comes to training end users
Re-published courtesy Wesley Freeman, Junglemap UK In this article, I'd like to look at how we're currently issuing training to end users. More specifically - I'd like to look at some of the common problems I regularly hear CISO's/CDIO's/CIO's talk about when it comes to training end...

Improving learning retention (or how to avoid the forgetting curve)
As humans we all forget things, in some cases it is no bad thing. In terms of learning and attending training at best this forgetfulness is a waste of resource, at worst it can open the door to errors and omisions that can cost dear. With a focus on information...