Microsoft Azure Information Protection (AIP) Scanner Tool Course

Microsoft Azure Information Protection (AIP) Scanner Tool Course

Our new course on data discovery and encryption with the Microsoft Azure Information Protection (AIP) Scanner Tool is out. Those who enroll in the course will learn all about setting up the AIP scanner and the requirements. They will also learn how to discover and protect your on-prem data. The Azure Information Protection (AIP) scanner

How To Create A Secure Password in 2019

You’d be amazed at how easy it is to create a secure password in 2019 and yet so many people don’t!  Despite the increasing efforts that many websites put into security precautions, it’s a two-way street and users need to catch up and take responsibility too. Weak passwords are still a common way to hack

feature image for data discovery in cyber security implementations post

Data Discovery as an Important First Step in Cyber Security Implementations

Data security is the staple of a successful business in this era, and most businesses invest into at least basic cyber security. After all, it’s much more affordable when compared to the aftermath of a data breach. Before you implement security measures that will keep your business and reputation safe, you should know what type

finger pointing to a padlock - improve your email security tips

11+ Ways to Improve Your Email Security Today

Email accounts are used as the most common point of entry by hackers to get access to networks and either disrupt services, steal information, or spread malevolent software to more accounts. But, if you improve your email security, you can prevent this! So, What Is Email Security? Put simply, email security is a term that

How much does Azure Information Protection Cost Feature Image

How Much Does Azure Information Protection Cost?

With increasing cyber security threats as well as GDPR (General Data Protection Regulation) having taken effect from 25 May 2018, businesses need to protect their sensitive data. One of the ways we recommend to our clients is by using Microsoft’s Azure Information Protection (AIP) as a way of protecting and automatically encrypting sensitive information. But,

The Different Tactics Hackers Use to Gain Access to Your Computer

We’d all like to think that hackers are spending weeks on end planning their every move to attack a business but the truth of it is nowhere near as exciting. Although this could happen to a big target, for most people it’s a lot more boring and they get ‘accidentally’ caught in the net as

busy coffee shop as a small business

How “At Risk” Small Businesses REALLY Are to Cyber Attacks

Running a small business comes with a very specific set of challenges, like having limited resources, and often cyber security falls to the bottom of the list. But, the cost of a data breach, no matter the size of your organisation can be huge and the bad PR or image alone could be crippling as

Top 10 Software and Tech Solutions for Small Businesses

Don’t shy away from technology in your business! It’s time to get acquainted with some of the best software and tech solutions for small businesses at the moment. 1. Encrypt emails for free with My Protected Mail Of course we’re going to start with one of our own products! The introduction of GDPR has placed a

How To Protect Your Email Password From Hackers

*This article originally appeared here on LinkedIn* How To Protect Your Email Password From Hackers In my previous article I have showed how easy it is for hackers to get your outlook & 365 password. The method I showed requires the hacker to be on the same network as you (WI-FI or Local) but usually hackers will use much

12 Warning Signs Of A Phishing Email

The importance of online security is bigger than ever and with criminals coming up with new and inventive ways to catch you, we must remain vigilant. Previously we have discussed how to defend yourself against phishing but with increasingly clever tactics we thought we would highlight some 10 ways you can sniff out a potential threat