cyber risk

Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching consequences, allowing threat actors to access an abundance of valuable, personal inform…

Read More Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings

Despite office workers being aware of the cybersecurity challenges faced by their employer – especially when it comes to hybrid working – many admit to high risk behavior including sharing passwords, downloading non-work related files and e…

Read More Office workers unwilling to change their behavior, despite being aware of the cybersecurity challenges