New Blog Release: Protecting Against the Insider Threat

31 Mar 2016

The "trusted insider" threat remains one of the most potent, yet least understood, of the all the security threats that organisations face. All too often protections are designed based on an assumption that attacks will emanate from external sources, leaving an organisation poorly equipped to deal with malicious activity perpetrated by individuals with trusted access.

Our latest blog posts helps you to understand who is the insider threat and takes a closer look at what organisations can do to protect against the threat.

To read the blog in full, please click here

This post is the final in our blog series on the work we have recently contributed to the IET’s Engineering and Technology Reference.

CHECK IT Health Check Service
Cyber Essentials
CESG Certified Service
First - Improving Security Together
BSI ISO 9001 FS 581360
BSI ISO 27001 IS 553326
PCI - Approved Scanning Vendor
NCSC CCSC - Assured Service Provider
ASSURE Cyber Supplier - CAA