Welcome to the CommSec Blog
Navigating ISO 27001 Certification: Key Changes, Benefits, and Why You Need It
Discover why ISO 27001:2022 certification is essential for modern businesses. Learn about the key changes, [...]
Read more
21
Feb
Feb
How IT Security Leaders Can Set Themselves Up for Success in 2025
Discover actionable strategies for IT security leaders to overcome 2025's top challenges, including AI risks, [...]
Read more
09
Jan
Jan
How to Choose the Right Cyber Security Solution
Discover the top 10 considerations for selecting the right technology vendor, including integration, scalability, compliance, [...]
Read more
16
Dec
Dec
Patch Management and Software Updates A Practical Guide
Discover the importance of patch management for cybersecurity, operational efficiency, and compliance. Explore top software [...]
Read more
18
Nov
Nov
Secure Communications: The Cornerstone of Compliance in the Digital Era
As businesses adapt to digital transformation, the need for secure communications has become more critical [...]
Read more
29
Oct
Oct
Grants for Businesses to Improve Cyber Security in Ireland
Discover how Irish SMEs can strengthen their cybersecurity with funding opportunities, expert reviews, and grants [...]
Read more
23
Sep
Sep
Understanding Incident Response and Digital Forensics
Explore the differences and synergy between Incident Response and Digital Forensics in cybersecurity, and learn [...]
Read more
27
Aug
Aug
The Role of GRC Tools in Modern Compliance
Discover how GRC tools streamline compliance, reduce manual tasks, and enhance risk management with continuous [...]
Read more
22
Aug
Aug
The NIS2 Directive Uncovered
Discover the essentials of the EU's NIS2 Directive and its impact on cyber security. Learn [...]
Read more
22
Jul
Jul
The Dark Side of AI: A New Era of Cyber Threats
Explore the dark side of AI in cybersecurity – from sophisticated social engineering scams to [...]
Read more
05
Jul
Jul
How Alert Monitoring Can Transform Your IT Security
Imagine hackers inside your network for a week before you even notice. That is the [...]
Read more
18
Jun
Jun
Engaging the Board to Build Cyber Resilience
Learn how to get board buy-in for cybersecurity initiatives by focusing on the business impact [...]
Read more
10
Jun
Jun
The Hidden Threats of Browser Extensions
Uncover the hidden dangers of malicious browser extensions lurking in your web browser. Learn how [...]
Read more
16
May
May
Making the Most of Your Penetration Test Report
A pen testing report offers more than just a list of vulnerabilities. This blog post [...]
Read more
11
Apr
Apr
Compliance Made Easy with Powerful Password Management
Stressed about IT compliance for password management? A Password Manager helps IT teams simplify compliance [...]
Read more
13
Mar
Mar
Inspiring Inclusion in Cyber Security on International Women’s Day
To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]
Read more
07
Mar
Mar
Enhance Email Security and Deliverability with DMARC
Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]
Read more
31
Jan
Jan
World Data Protection Day 2024: Latest Developments in Data Privacy
As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]
Read more
25
Jan
Jan
From Social Engineering to AI Powered Threats: Part 1 2023 in Review
In the ever-evolving world of cybersecurity, 2023 was a year marked by both challenges and [...]
Read more
20
Dec
Dec
From Social Engineering to AI Powered Threats: Part 2 Top Cybersecurity Tips
In this blog post, we asked our experts to rank the most common cybersecurity measures [...]
Read more
20
Dec
Dec
From Social Engineering to AI Powered Threats: Part 3 Predictions for 2024
In this blog post, our frontline cybersecurity people share their insights, providing valuable perspectives on [...]
Read more
20
Dec
Dec
Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X
This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]
Read more
22
Nov
Nov
Cyber Crime – Google Search Engine Result Poisoning
Introduction Google search engine result poisoning is a type of cyber attack in which attackers [...]
Read more
10
Nov
Nov
How a 24/7 SOC service can help with compliance for NIS2 and DORA
One of the key requirements of NIS2 is that organisations must have a process for [...]
Read more
24
Oct
Oct
Cyber Resilience and Risk Management Top 10 Takeaways
Cyber security is a critical issue for businesses of all sizes, and it is important [...]
Read more
16
Oct
Oct
Cyber Security Month October 2023
October is Cybersecurity Awareness Month, and CommSec are committed to helping our customers stay safe [...]
Read more
02
Oct
Oct
Antivirus Versus Outsourced Cyber Security for Small Business
Antivirus vs. Outsourced Cyber Security: Which is the Best Investment for Your Small Business? If [...]
Read more
27
Sep
Sep
The Anatomy of a Third-Party Data Breach
Third-party partnerships have become a cornerstone of modern business operations, but they also introduce security [...]
Read more
12
Sep
Sep
DLP: How to Protect Your Data from the 3 Biggest Risks
Protecting Your Organisation’s Data with DLP In the wake of the recent massive data breach [...]
Read more
30
Aug
Aug
How to Secure Your Microsoft 365 Environment
Securing your M365 Environment: A Guide for Business Microsoft 365 (M365), formerly known as Office [...]
Read more
20
Jul
Jul