Year on year the value of data is increasing. Protecting both your company’s data and your clients’ must be a top priority for every organisation. Backing up onto disks is fading to a distant memory
Even wondered what cyber insurance is, why you need it or how to get it? Our CISO, Paul Delahunty, sits down and answers your cyber insurance questions.
Five of our experts at Stryve sit down and answer - in plain English - the questions you have been googling for months.
Year on year the value of data is increasing. Protecting both your company’s data and your clients’ must be a top priority for every organisation. Backing up onto disks is fading to a distant memory
Andrew and the team at Stryve are delighted to announce that we have partnered with London based digital communications company, Atticus Creative. Having worked with the digital agency on several projects in the past,
In the final video in Stryve’s seven-part series, Paul Delahunty, our Information Security Officer, speaks to Kathleen Lucey, Client Director at Stryve, about the importance of training your employees.
In the sixth video in Stryve’s seven-part series, Paul Delahunty, our Information Security Officer, chats to Kathleen Lucey, our Client Director, about what to do when – not, if – a cyberattack happens.
In the fifth video in Stryve’s seven-part series, Paul Delahunty, Stryve’s Information Security Officer, speaks to Kathleen Lucey, our Client Director, about the importance of having backups.
In the fourth video in Stryve’s seven-part series, Paul Delahunty, Information Security Officer at Stryve, and Kathleen Lucey, our Client Director, discuss how you can secure your business’s devices.
In the second video in Stryve’s seven-part series, Paul Delahunty, Information Security Officer at Stryve, and Kathleen Lucey, our Client Director, discuss phishing. Paul explains that phishing is when a hacker (or criminal)
In the first video in Stryve’s seven-part series, Paul Delahunty, Information Security Officer at Stryve, speaks to Kathleen Lucey, our Client Director about how you can protect against cyberattacks.
Over the past few years, “pen test” has become something of a buzzword. Some companies swear by pen tests, others perform multiple a year and certain cyber insurance providers won’t even talk to you unless you can verify that you’ve done one.
Simply put, the Internet of Things (IoT) is the concept of connecting all types of things to the internet. To illustrate this concept, imagine the following scenario: you leave work and hop into your internet-connected smart car.
Stryve’s CEO, Andrew Tobin, speaks to The Independent about the organisation’s recent certification as carbon neutral. He discusses his surprise when he learned how high the carbon emissions were for a small company like Stryve,
Over the past number of years, “the cloud” has entered the dictionary to the excitement of many and the bewilderment of many more. In the early days, products offered by big players (AWS, Google) ensured that the public cloud was the cloud of choice.
When you start a conversation with someone about Information Security, it will almost immediately turn towards phishing, ransomware, hackers, data protection/the GDPR and other common threats.
Microsoft 365 has 258 million corporate users: a figure greater than one third of Europe’s population. This will startle most readers, yet many will also find it easy to understand why gaining access to an organisation’s...
There is a common misconception that Microsoft takes care of its clients’ data backups. Therefore, the automatic response, when most clients when asked if their Microsoft 365 data is backed up, is, “of course it is.”
Cybercrime has been around for over 20 years, however, cybersecurity threats are constantly changing and evolving. Today, phishing attacks account for over 90% of security breaches. As the technology to combat this issue becomes more advanced and sophisticated, so too do the forms that phishing attacks take.
How The UK and Ireland Compare When it Comes to Cybersecurity?
Ireland ranks 7th out of 28 EU member states in the European Commission Digital Economy and Society Index (Europe Commision , 2019). It is, undoubtedly,
How SMEs Can Cope with the Growing Threat from Cyber Attacks
Over the past few years, there has been a steady rise in cybercrime across the world. As more and more secure software products are produced each day
Key Differences Between a Risk Assessment and Penetration Test
We often hear terms such as “Risk Assessment”, “Penetration Testing” and “Vulnerability Scanning” thrown around interchangeably,
CISO – Business Enablement
Business Enablement
Although a Chief Information Security Officer, or CISO, is a vital component of any organisation, most companies are still unfamiliar with the role.
We all face a period of ongoing certainty as we deal with the fall out from Covid-19. One of the many secondary effects has been the change in how we work.
The Journey of a CISO
With the global cost of cybercrime set to reach $6 trillion by 2021, it is becoming imperative for every organization to have a Chief Information Security Officer, or CISO, at the top table.
Legal and Regulatory Elements of a CISO’s Role
With such a diverse range of responsibilities, the path to becoming a Chief Information Security Officer, or CISO, appears long and winding.
It Is Time for a Chief Information Security Officer at the Top Table
Cyberattacks are becoming a major issue within our modern world. Data breaches and malware threaten the security of a company and it’s customers,
Why Security Compliance is so Important for Businesses
Security Compliance
IT or Data Security Compliance to legal requirements should be viewed as an absolute minimum for organisations today.
The Essentials of Cybersecurity Solutions
It is now well established that cybersecurity solutions are challenging for organisations because of their critical nature,
As the CIO or IT manager of a medium to a large company you will most certainly have heard the term Cloud Computing on numerous occasions, you’ve also probably heard the variations,
Strategy and planning are at the heart of the most successful business ventures, yet business continuity and disaster recovery, fall short of most organisations‘ consideration.
The 12 Steps to Cyber Security Report, issued by the National Cyber Security Centre, breaks down and outlines the steps needed for companies to implement an effective cybersecurity system.
Despite its frightening definition, and even more frightening impacts, hacking does not normally receive the attention it deserves. This is surprising when we consider how of the 15 largest data breaches in history,
GDPR and the Effect on Marketing Communications
“Nothing was your own except the few cubic centimetres inside your skull.” – George Orwell