Blog
Home / Blog
Cybersecurity Checklist for Remote Working
cybersecurity remote-workingIf the Covid-19 pandemic has forced your organisation to adopt remote working for employees, it is very likely that you were required to roll out new IT applications and services to maintain your employee efficiency, business continuity and [production capacity]. But as companies are implementing the new system to cater to the needs of remote workforces, this transformation may not have been very smooth for some of them due to limited technology capability.
‘Building Business Cyber Resilience in an Era of Cyber Breaches
CISO cybersecurityWe are operating in an era of expansive cyber-security breaches within both government and non-government organisations. As such, we must continue to build business resilience in the face of constant attacks. Failure to stay ahead of the curve will lead to major losses in the business environment and significant security risks for the country at large. Having worked with government security agencies and the local business community, we’ve seen first-hand what happens when you don’t have a resilient security system.
‘3 Tips to Improve Cloud Security and Data Integrity
cybersecurity cloudThe shift from on-premises operations to cloud-based alternatives come with strategic benefits and inherent risks. Chief amongst these risks is data breach. Therefore, maintaining data integrity becomes paramount in our digital environment; cloud security a CISO nightmare or saving grace. As the manager or owner of a company, you can expect a cyber security incident to cost your business at least £1,410 per event. This amount increases the larger your company is.
‘The Impact of Corona Virus on Cyber Security
cybersecurity covid19The COVID-19 (Coronavirus) pandemic is spreading globally at an alarming rate, and along with disruption in global health, it is also causing damages to social, economic and political systems all over the world. Nearly the entire world workforce is now working remotely from homes, causing them to heavily rely on digital tools and remote means of communication. This has allowed cyber criminals to capitalize the situation and actively exploit the COVID-19 crisis.
‘Linking Bitbucket Server to Netlify
atlassianOne of the challenges facing companies using Atlassian products behind the firewall is how to configure them to get the same functionality offered by their Cloud brethren. At Attomus we love Netlify but setting it up to auto-trigger builds from private repositories on Bitbucket Server running behind a proxy and firewall - is not as simple as one would hope! Having gone through the process ourselves, we thought it could be valuable for others to put together a quick step by step guide; in our example we’ve got an NginX server acting as a proxy facing the internet, with bitbucket running on a private server, and we want to both trigger builds automatically when we commit an update to the repository, and to ensure Netlify has visibility of the code in order to actually build our site.
Topics
ai atlassian banking best-practices blockchain ciso climate-change cloud counter-measures covid19 crime crypto culture customer-success cybersecurity data-management data-protection data-security development dlp employees gdpr governance identity-theft infrastructure insider-threat malware office365 offshoring phishing privacy remote-working risk-management robotics security semafore slack social-media technology trojan-horse work-experienceFeatured
AI vs. Web Developers - Collaboration or Competing?
AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...
Blockchain Technology & the Future of Cybersecurity
Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...