In today’s digital age, securing sensitive information is paramount, leading organizations worldwide to adopt rigorous standards for information security management. ISO 27001 and SOC 2 emerge as two prominent frameworks, each offering distinct approaches to safeguarding data. While both serve … Read More
Blog
Cybersecurity for startups: What do as a founder to secure your firm: Part 2 – Identify (ID)
Introduction With plenty of data providing the evidence that attacks are getting more commonplace, and the impacts are also increasing, it’s only logical for us to lead from our experience of dealing with startups but also large enterprises. With technology … Read More
Cybersecurity for startups: What you can do as a founder to secure your firm Part1: NIST CSF
Some sobering statistics on small business impacts A startup like regular smaller companies has competing priorities for the amount of money to spend on cybersecurity. At the same time, it goes through growing pains going from a small team blossoming … Read More
What is vCISO?
What is a vCISO? A vCISO is a virtual chief information security officer who helps organisations like yourself with no existing cybersecurity staff or leadership. A vCISO or fractional CISO helps small and medium enterprises get in control of their … Read More
What is a canary in the field of cyber security
What is a Canary? Other than obviously being a bird, back in the day, a canary would be a prized possession for miners around the world. In a mine, the level of methane and carbon monoxide could lead to the … Read More
Log4j – a TLDR summary for SME IT leaders
TLDR Log4J is a logging library for Java applications for which critical vulnerabilities was discovered. An unauthenticated remote actor could exploit this vulnerability to take control of an affected system. With the library being included in many applications knowingly and … Read More
SOC 2: What is it and how does the process look like
What is SOC2 compliance? In today’s digital age, data security is of utmost importance. How can businesses ensure that they are protecting their customers’ information? The answer lies in SOC 2 compliance, one of a few compliance standards. SOC 2, … Read More
Cyber security for family offices
Family offices are increasingly becoming prime targets for cybercriminals due to their wealth and the availability of personal information on public platforms. These entities manage substantial assets and often have intricate networks that may not be as secure as larger … Read More