NIS2 Directive – Network and Information Security Directive

Why is the NIS2 directive so important? The NIS2 directive has recently been released with updated standard for cybersecurity. It is a European Union initiative to raise cybersecurity standards. This is timely as recent high-profile incidents have brought cybersecurity sharply into focus for regulators. International and local authorities are changing how organisations approach cybersecurity. One […]
Cyber Security Check List
Action Item Checklist Function Summary Description User Name and Password Protection Strictly enforce robust password security as per NIST Standards that include Upper and lower case letters, numbers and symbols Minimum of 8 characters, avoiding common words and dates Password not used for any other log in’s Changing passwords regularly – 3 months Using 2 […]
Virtual CIO
Our vCIO service gives your organisation a competitive advantage because it gives you something that your business truly lacks: an expert opinion. Technology has become a major line item on your budget. If your organisation doesn’t have the on-staff technical expertise to direct or cost-effectively implement the technology solutions you need in a manner that […]
Ransomware
Ransomware is primarily about money, the ability of the ransomware author to get money from the victim with in a very short period of time. Phishing is the ability of a person to gain control to your system for the purpose of monetary, data or other information retrieval from your system. Immediate financial gain is […]