Dedicated to Security

Attomus / Blog

Are You the Weak Link in a Supply Chain Attack?

Are you the weak link that could lead to a massive cybersecurity breach that could lead to millions of dollars in fines for a company? Doesn’t seem to be a real possibility, right? But the truth is, each of us has the potential to be a gateway to major breaches for our employers, our customers, clients, and suppliers. Or you may not be the direct link - it could be something you trusted to be safe, only it wasn’t.

Read More…

Good Simply Isn’t Enough

The Hidden Costs of Poor Cybersecurity Measures for Small Businesses Cybersecurity measures for small businesses is a major topic as we head into 2021. It comes as no surprise, given the pandemic, the increasing number of attacks, and various high-profile companies making the news. Zoom came to the forefront of cybersecurity issues when it became known that they didn’t provide end-to-end encryption of customer’s communication. The company reached a settlement with the US Federal Trade Commission for misrepresenting its security features.

Read More…

Should Employee Training include CyberSecurity?

Let me start by stating the obvious - it pays to offer continuous and comprehensive employee training. A Life with Health CEO Aimee Tariq explains why in her article ‘4 Big Benefits of Improved Employee Training’. She outlines how such an initiative provides a quicker pathway to productivity, enhances employee engagement, improves employee retention, and helps ensure long-term profitability. And in this increasingly digitalised world, offering digital skills training has become a must, with tech writer Daniel Ling noting in the blog ‘Professional Development in Today’s Digital Landscape’ how training in anything related to tech and digital marketing “can fill skill gaps,” in turn “ensuring relevancy in fast-evolving areas of knowledge.

Read More…

Effective Information Security & Risk Management ISRM Programmes

Let us start by stating an age-old maxim : You cannot eliminate all risks. But you can reduce the level of risks to an acceptable standard. That’s why building an Information Security and Risk Management (ISRM) programme is essential. Our businesses generate an ever-increasing volume of data. So, in an era where information is currency, and cyber threats continue to evolve, an effective ISRM programme is a necessity. Let’s take a quick look at ISRM and what it takes to put in place an effective programme.

Read More…

Cybersecurity Checklist for Remote Working

If the Covid-19 pandemic has forced your organisation to adopt remote working for employees, it is very likely that you were required to roll out new IT applications and services to maintain your employee efficiency, business continuity and [production capacity]. But as companies are implementing the new system to cater to the needs of remote workforces, this transformation may not have been very smooth for some of them due to limited technology capability.

Read More…

Register if you want to learn about cybersecurity and advanced tech.

You can unsubscribe with one click, and we'll never share your email address.

Topics

Featured

AI vs. Web Developers - Collaboration or Competing?

AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...