NIS2 – Why should you care?

Part of the well known meme: “the EU regulates” comes to mind with the latest directive from the EU. NIS 2. Following hot on the heel of NIS 1, NIS 2 is a directive, rather than a regulation, that encompasses Cyber Security. EU member states need to incorporate the directive into law by 18th October 2024 - which is not far away. The “state” will become more active in reducing the impact cyber risks as society continues to become [...]

2024-06-04T15:28:07+00:00June 4, 2024|

Embracing the Future of Vulnerability Management: Insights for IT Security Leaders 

In the ever-evolving landscape of cybersecurity, the surge in vulnerabilities continues to accelerate, demanding a strategic and adaptive approach from organisations. As a leader responsible for IT security, you understand the critical importance of managing and prioritising vulnerabilities effectively in alignment with your organisational priorities. In this article, we delve into three pivotal trends that are shaping the future of Vulnerability Management and discuss how Rebasoft is at the forefront of addressing these challenges.  Trend 1: Asset Management and [...]

2023-09-04T09:35:16+00:00September 4, 2023|

Reduce ransomware by 86 %?

Reduce ransomware by 86 %?In researching our latest paper on how we can better help our customers defend against Ransomware, I started looking at statistics and how they are used.IT sales and marketing never miss an opportunity to quote and re-purpose/reuse a statistic or study. I'm no different from anyone else and always on the lookout for an eye-catching number to support why organisations should use our technology. 86% of breaches are financially motivated, according to the 2020 Verizon [...]

2023-03-30T15:27:31+00:00March 25, 2022|

AI for Cybersecurity

Artificial Intelligence (AI) and Cybersecurity A lot of hype still surrounds Artificial Intelligence (AI). Even Gartner has it covered in a “Hype Cycle” (Its Hype Cycles covers new, emerging technologies). As part of a series of webinars we're running, this blog post looks at AI, what can it mean for cyber security, what are the pros and cons when deploying it and how you might use it with more traditional deterministic defences? There is plenty [...]

2023-04-18T16:02:25+00:00January 31, 2022|

New year – new advice?

New year - new advice? The potential conflict over Ukraine is a reminder of state-sponsored cyber-threats. A bulletin published by the US government's Cybersecurity and Infrastructure Security Agency (CISA) serves as a useful checklist for both concerns about state-sponsored and security threats in general. The natural response might be to get the latest Gartner sponsored or new AI security system to aid protection. These can be difficult (and expensive) to buy and operate. Much can [...]

2022-01-19T13:59:17+00:00January 19, 2022|

86% of business owners believe digital risk will continue to grow

86% of business owners believe digital risk will continue to grow This is just one of the latest set of statistics to come across my desk. Whether it is true or not people believe they are at risk and often feel helpless to do anything about it. Many businesses believe they could be breached, but not many know what they can do - they lack the skills, they lack the technology and resources. "43% of [...]

2022-01-04T13:07:42+00:00April 16, 2020|

Saving on network maintenance contracts

Saving on network maintenance contracts In order to obtain security patches, most vendors require a software support contract to be in place. It is really difficult to maintain a reliable inventory of equipment so that any support agreement is right-sized (ie that you are not paying too much).... "Systems at unsupported servicing levels or releases will not receive security updates for new vulnerabilities which leaves them subject to exploitation" Outdated hardware, [...]

2022-01-04T17:38:13+00:00August 12, 2019|

Human error is behind most of the successful cyberattacks on businesses

Human error is behind most of the successful cyberattacks on businesses Even if employees are aware of the risks of suspicious emails, they still click the links anyway. You can train users not to, but research shows they will forget most of what was taught within the first 24 hours. Social engineering, scams and malware trip up the unwary, so how can you protect your business against your users? "Anti-malware controls, firewalls, and intrusion prevention [...]

2022-01-04T17:39:55+00:00January 7, 2019|