reba_wpadmin

About reba_wpadmin

This author has not yet filled in any details.
So far reba_wpadmin has created 12 blog entries.

IT Hardware, Software & Vulnerability Audit: Not just for Christmas

IT Hardware, Software & Vulnerability Audit: Not just for Christmas This blog explores the concept of IT hardware, software and vulnerability audit. It highlights their crucial role in an organisation's IT security strategy, compliance with regulations, cyber security framework accreditation, and business insurance policies related to cyber security coverage. It emphasises the benefits and outcomes of such audits and argues for adopting real-time, always-on audits as a standard practice for IT teams. Introduction In today's digital landscape, businesses rely heavily [...]

2023-06-07T12:46:41+00:00June 7, 2023|

The Critical Role of Vulnerability Management in Network Security Strategy

The Critical Role of Vulnerability Management in Network Security Strategy   In today's digital landscape, a robust network security is paramount for organisations to protect their sensitive data and maintain customer trust. An effective network security strategy requires a proactive approach that addresses vulnerabilities before they can be exploited. This is where vulnerability management comes into play. In this blog post, we will delve into the importance of vulnerability management in network security and its crucial role in achieving [...]

2023-06-09T11:48:32+00:00June 5, 2023|

Newsletter May

Channel Newsletter - May 23' Since 2009 Rebasoft, a leading UK-based software solutions company delivering agentless asset management, secure compliance and vulnerability management from a single platform to help organisations gain full visibility, control and secure their networks whilst achieving and maintaining compliance standards, has announced its commitment and investment into a channel-first strategy. Rebasoft hires new channel sales leader Kevin Monk has recently joint the team at Rebasoft to lead channel engagement across the EMEA region. Monks bring [...]

2023-06-07T10:45:20+00:00June 2, 2023|

Misconceptions about Vulnerability Management

Vulnerability management is one of the most important cyber security tasks. But it is also tricky and complex, giving rise to dangerous misconceptions which can lead to misguided practices and ineffective security. When it comes to communicating vulnerabilities, risks and threats to senior management, misconceptions can greatly harm communication and have a knock-on effect to your security strategy. Don't let the myths stand in your way, get the facts and sharpen your security. Myth 1. Vulnerability management and patch management [...]

2023-05-30T10:34:04+00:00May 30, 2023|

How dangerous is the mysterious Rorschach ransomware?

Researchers uncover a new strain of malware with unusual features Check Point Research (CPR) uncovered a mysterious, new strain of ransomware. What stands out most, is that it's completely unbranded, very unusual for the ransomware ecosystem where reputation is everything. It also boasts faster encryption speeds than any other strain before and has rare, unusual features compared to others. What do you see in the inkblots? This new strain of ransomware is unusually customisable, allowing users to deploy it how [...]

2023-04-18T14:40:35+00:00April 18, 2023|

Why you should take a risk-based approach to cyber security

The checklist mentality According to the WEF (World Economic Forum) Global Cyber Security Outlook 2023, attitudes have shifted, with many now seeing cyber security frameworks as an effective tool for improving cyber security accross the private sector. Following a cyber security framework such as Cyber Essentials or ISO 27001 has been shown to reduce the chances of a data breach by up to 86%. But it's a double edged sword. Now, many people think of cyber security and security standard [...]

2023-04-18T09:52:50+00:00April 17, 2023|

Why you shoud go agentless in 2023

Why 2023 is the year to go agentless In today’s fast paced IT environment, networks are changing at an accelerating pace. In just these past few years we have seen the widespread migration to the cloud, introduction of remote working and adoption of IoT (Internet of Things) devices. What we are facing here is a crisis of complexity. Users want more functionality, but this creates a web of complexity, the perfect environment for cyber attackers to manoeuvre. Attackers always have [...]

2023-04-14T12:12:58+00:00April 14, 2023|

Why asset management is critical

IT Asset Management (ITAM), how important is it to get it right? As the world becomes increasingly digital, the importance of effective IT asset management has never been more critical. Without proper management of assets, organizations cannot achieve their business objectives, and their IT infrastructure becomes vulnerable to security threats, compliance issues, and other challenges 4 Reasons why its critical to get right Control Costs: Tracking IT assets and their usage, an organizations can gain understand where their IT [...]

2023-03-31T15:24:25+00:00March 31, 2023|

Cybersecurity frameworks: safeguarding businesses

Cybersecurity frameworks - safeguarding businesses With the fast-paced and ever-changing technological landscape, having a strong and effective cybersecurity framework is critical to ensuring the safety and security of your organisation's data and assets. The threat of cyberattacks has become a constant concern for businesses of all sizes with the average global cost of a data breach in 2022 now sitting at $4.25m Why do you need a cybersecurity framework? Implementing a cybersecurity framework can help your organisation manage the [...]

2023-03-31T15:26:10+00:00March 31, 2023|

Reduce ransomware by 86 %?

Reduce ransomware by 86 %?In researching our latest paper on how we can better help our customers defend against Ransomware, I started looking at statistics and how they are used.IT sales and marketing never miss an opportunity to quote and re-purpose/reuse a statistic or study. I'm no different from anyone else and always on the lookout for an eye-catching number to support why organisations should use our technology. 86% of breaches are financially motivated, according to the 2020 Verizon [...]

2023-03-30T15:27:31+00:00March 25, 2022|