Welcome to the CommSec Blog

Making the Most of Your Penetration Test Report

A pen testing report offers more than just a list of vulnerabilities. This blog post [...]

Read more
Compliance Made Easy with Powerful Password Management

Stressed about IT compliance for password management? Keeper helps IT teams simplify compliance with built-in [...]

Read more
Inspiring Inclusion in Cyber Security on International Women’s Day

To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]

Read more
Enhance Email Security and Deliverability with DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]

Read more
World Data Protection Day 2024: Latest Developments in Data Privacy

As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]

Read more
From Social Engineering to AI Powered Threats: Part 1 2023 in Review

In the ever-evolving world of cybersecurity, 2023 was a year marked by both challenges and [...]

Read more
From Social Engineering to AI Powered Threats: Part 2 Top Cybersecurity Tips

In this blog post, we asked our experts to rank the most common cybersecurity measures [...]

Read more
From Social Engineering to AI Powered Threats: Part 3 Predictions for 2024

In this blog post, our frontline cybersecurity people share their insights, providing valuable perspectives on [...]

Read more
Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X

This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]

Read more
Cyber Crime – Google Search Engine Result Poisoning

Introduction Google search engine result poisoning is a type of cyber attack in which attackers [...]

Read more
How a 24/7 SOC service can help with compliance for NIS2 and DORA

One of the key requirements of NIS2 is that organisations must have a process for [...]

Read more
Cyber Resilience and Risk Management Top 10 Takeaways

Cyber security is a critical issue for businesses of all sizes, and it is important [...]

Read more
Cyber Security Month October 2023

October is Cybersecurity Awareness Month, and CommSec are committed to helping our customers stay safe [...]

Read more
Antivirus Versus Outsourced Cyber Security for Small Business

Antivirus vs. Outsourced Cyber Security: Which is the Best Investment for Your Small Business? If [...]

Read more
The Anatomy of a Third-Party Data Breach

Third-party partnerships have become a cornerstone of modern business operations, but they also introduce security [...]

Read more
DLP: How to Protect Your Data from the 3 Biggest Risks

Protecting Your Organisation’s Data with DLP In the wake of the recent massive data breach [...]

Read more
How to Secure Your Microsoft 365 Environment

Securing your M365 Environment: A Guide for Business Microsoft 365 (M365), formerly known as Office [...]

Read more
Why You Should Consider DPO-as-a-service for Your Business

In an age dominated by data and technology, protecting the privacy and security of personal [...]

Read more
Protect Your WordPress Website: Unveiling Vulnerabilities and Preventing Exploits

In today’s digital landscape, ensuring the security of your WordPress website is paramount. Hackers are [...]

Read more
Secure Your Cloud: Get a Cloud Security Assessment

The cloud has revolutionised the way businesses operate by providing them with a cost-effective and [...]

Read more
The Importance of Incident Containment during a Cyberattack

The containment phase is a critical aspect of the Incident Response plan during a cyberattack. [...]

Read more
The Essential Guide to Cybersecurity for Small and Medium-Sized Enterprises (SMEs)

Protect your business and customers' data with our 12-step guide to enhancing your SME's cybersecurity [...]

Read more
Why Penetration Testing is Essential for Business Security in 2023

In today's digital age, cybersecurity threats are constantly evolving, and it's becoming increasingly difficult for [...]

Read more
Secure Your Digital Assets with SASE

The world of cybersecurity is constantly evolving, and organisations are always looking for new solutions [...]

Read more
Four Essential Elements of A Penetration Test Report

Penetration testing is an important tool for businesses to protect their networks and data from [...]

Read more
CISO as a Service – A Trusted Partnership in the Making

Introduction Over the last few years, cyber threats have evolved significantly, becoming more sophisticated and [...]

Read more
IT Asset Management for Education Providers

Education providers and third level colleges have a unique responsibility to safeguard the personal data [...]

Read more
Understanding DORA, NIS2 and CER

The EU is fighting back against cybercrime and protecting critical infrastructure with some new legislation. [...]

Read more
Everything you need to know about Credential Stuffing

What is Credential Stuffing? Credential stuffing is a type of cyber-attack in which an attacker [...]

Read more
The Differences Between Penetration Testing and Vulnerability Scanning

The Differences Between Penetration Testing and Vulnerability Scanning The key difference between a penetration test [...]

Read more