Category Archives: Blog
Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X
This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]
22
Nov
Nov
Cyber Crime – Google Search Engine Result Poisoning
Introduction Google search engine result poisoning is a type of cyber attack in which attackers [...]
10
Nov
Nov
How a 24/7 SOC service can help with compliance for NIS2
One of the key requirements of NIS2 is that organisations must have a process for [...]
24
Oct
Oct
Cyber Resilience and Risk Management Top 10 Takeaways
Cyber security is a critical issue for businesses of all sizes, and it is important [...]
16
Oct
Oct
Cyber Security Month October 2023
October is Cybersecurity Awareness Month, and CommSec are committed to helping our customers stay safe [...]
02
Oct
Oct
Antivirus Versus Outsourced Cyber Security for Small Business
Antivirus vs. Outsourced Cyber Security: Which is the Best Investment for Your Small Business? If [...]
27
Sep
Sep
The Anatomy of a Third-Party Data Breach
Third-party partnerships have become a cornerstone of modern business operations, but they also introduce security [...]
12
Sep
Sep
DLP: How to Protect Your Data from the 3 Biggest Risks
Protecting Your Organisation’s Data with DLP In the wake of the recent massive data breach [...]
30
Aug
Aug
How to Secure Your Microsoft 365 Environment
Securing your M365 Environment: A Guide for Business Microsoft 365 (M365), formerly known as Office [...]
20
Jul
Jul
Why You Should Consider DPO-as-a-service for Your Business
In an age dominated by data and technology, protecting the privacy and security of personal [...]
12
Jul
Jul