More data is publicly available than ever before… And it’s a major cyber security risk
Whenever we first engage with organisations to help them optimise their cyber security posture, they’re often surprised at the number of hidden attack vectors that need to be given careful consideration. While the fundamentals of cyber best practice are well-documented at this point, new threats are constantly emerging, which means this is very much a […]
Does the humble USB drive still have a home in the modern workplace?
Formerly ubiquitous in the workplace, with their small size making them a useful way of transporting important files, there are growing cyber security concerns about USB drives and their usage.
Xpertex Achieves Elite Plus Partner Status in the Juniper Networks Partner Advantage Program
Xpertex is recognised for Leadership in Sales, Customer Service Excellence, Technology Expertise and Security Specialisation, marking the next phase of commitment in providing enterprise businesses with AI-powered network security
The Threat of Phishing and the ‘Human Firewall’
Phishing is one of the most prevalent methods of breaching organisations’ cyber defences. You can have the best cyber security in the industry, but it only takes one ill-considered click and it’s all over. The ‘Human Firewall’ is your final line of defence when all other mechanisms have failed. If a phishing email is sitting in an employee’s inbox, it’s down to their security awareness to prevent disaster.
Smishing – learning to spot and secure against an emerging cyber threat
Anyone’s who’s used email over the years will be familiar the wide range of fake communications that encourage us to hand over our sensitive data – known as ‘phishing’ – and measures for identifying and securing against such communications are now an established part of cyber security best practice.
Confidence, Credibility, and World-class Security: Understanding the Cyber Essentials scheme
Cyber security is both more complex and more critical than ever before. For organisations ranging from start-ups to global leaders, an increasingly complex range of threats must be given careful consideration, as customers expect clear evidence that their sensitive data will always remain fully secure.
With so many factors to consider, and new ones appearing on a near-daily basis, developing robust cyber security can seem like an overwhelming prospect at first. Fortunately, the Cyber Essentials scheme provides a proven, recognised roadmap for establishing a true security culture within companies, helping them stay several steps ahead of global bad actors.
What is Breach & Attack Simulation, and Does it Mean the End for Traditional Penetration Testing?
I changed my mind on this (which doesn’t happen very often, but I will come back to that later)…
Breach & Attack Simulation (BAS) is an advanced security testing methodology that is designed to stress-test your cyber defences by launching ‘real’ cyber-attacks against your live systems, or a virtual representation of your technology infrastructure stack. When the results of this attack are analysed, any weaknesses will be highlighted, so they can resolved before a real-world attack takes advantage of them.
The case for data classification in corporate workflows
In an increasingly interconnected world, with enormous volume of data transferred on a daily basis, robust data classification helps organisations streamline and automate their data management processes, for the perfect blend of security and efficiency.
New partnership agreement announced with PhishedIO and Xpertex Limited
Xpertex is the new ambitious partner of Phished, pioneer in AI-driven Security Awareness Training. Together they offer organisations the latest standard in Security Awareness Training: 100% automated and personalised, without manual intervention.
Xpertex Limited Recognised as a 2022 Partner of the Year by Juniper Networks
London, United Kingdom – Xpertex Limited, a leader in the cyber security solutions and services industry, announced that it was recognised as a Partner of the Year by Juniper Networks, a leader in secure, AI-driven networks. Each year, Juniper Networks recognises Partners based on their ability to drive innovative business solutions, exceptional attention to the […]