Blog

Home / Blog

Cybersecurity Checklist for Remote Working

cybersecurity remote-working  

If the Covid-19 pandemic has forced your organisation to adopt remote working for employees, it is very likely that you were required to roll out new IT applications and services to maintain your employee efficiency, business continuity and [production capacity]. But as companies are implementing the new system to cater to the needs of remote workforces, this transformation may not have been very smooth for some of them due to limited technology capability.

Building Business Cyber Resilience in an Era of Cyber Breaches

CISO cybersecurity  

We are operating in an era of expansive cyber-security breaches within both government and non-government organisations. As such, we must continue to build business resilience in the face of constant attacks. Failure to stay ahead of the curve will lead to major losses in the business environment and significant security risks for the country at large. Having worked with government security agencies and the local business community, we’ve seen first-hand what happens when you don’t have a resilient security system.

3 Tips to Improve Cloud Security and Data Integrity

cybersecurity cloud  

The shift from on-premises operations to cloud-based alternatives come with strategic benefits and inherent risks. Chief amongst these risks is data breach. Therefore, maintaining data integrity becomes paramount in our digital environment; cloud security a CISO nightmare or saving grace. As the manager or owner of a company, you can expect a cyber security incident to cost your business at least £1,410 per event. This amount increases the larger your company is.

The Impact of Corona Virus on Cyber Security

cybersecurity covid19  

The COVID-19 (Coronavirus) pandemic is spreading globally at an alarming rate, and along with disruption in global health, it is also causing damages to social, economic and political systems all over the world. Nearly the entire world workforce is now working remotely from homes, causing them to heavily rely on digital tools and remote means of communication. This has allowed cyber criminals to capitalize the situation and actively exploit the COVID-19 crisis.

Linking Bitbucket Server to Netlify

atlassian  

One of the challenges facing companies using Atlassian products behind the firewall is how to configure them to get the same functionality offered by their Cloud brethren. At Attomus we love Netlify but setting it up to auto-trigger builds from private repositories on Bitbucket Server running behind a proxy and firewall - is not as simple as one would hope! Having gone through the process ourselves, we thought it could be valuable for others to put together a quick step by step guide; in our example we’ve got an NginX server acting as a proxy facing the internet, with bitbucket running on a private server, and we want to both trigger builds automatically when we commit an update to the repository, and to ensure Netlify has visibility of the code in order to actually build our site.

Register if you want to learn about cybersecurity and technology.

You can unsubscribe in one click, and we'll never share your email address.

Topics

atlassian ciso cloud covid19 crime culture cybersecurity insider-threat malware remote-working security

Featured

Cybersecurity Checklist for Remote Working

If the Covid-19 pandemic has forced your organisation to adopt remote working for employees, it is very likely that you were required to roll out new...

Building Business Cyber Resilience in an Era of Cyber Breaches

We are operating in an era of expansive cyber-security breaches within both government and non-government organisations. As such, we must continue to...