ramsac team

IT Blog Category: Cybersecurity

Cybersecurity – The importance of Testing & Training


Many organisations offer cybersecurity training to their staff, but training and testing as a combined strategy provides a much stronger defence against cybercrime. [...]

Man-in-the-Middle (MITM) attack – Cyber secure series


Man-in-the-middle attacks mean an attacker has intercepted communications between two people and has altered them in some way. Learn more today. [...]

Data Protection and Innovation: The Role of the ICO Regulatory Sandbox in the UK


In this blog, we'll explore the concept of the ICO Regulatory Sandbox and its objectives in the data protection landscape in the UK [...]

What is a break glass account?


If you’re creating a business continuity plan, have you considered a break glass account? Learn what one is and how to create one here. [...]

Cybersecurity vs cyber resilience

Cybersecurity vs cyber resilience – what is the difference?


What’s the difference between cybersecurity and cyber resilience, and how can you implement them? We cover this and more. [...]

Celebrating 20 Years of Cybersecurity Awareness Month


October is Cybersecurity awareness month, follow us on LinkedIn or Twitter for daily tips on how you can protect your organisation against Cybercrime. [...]

Ramsac network monitoring cybersecurity

How much should businesses invest in cyber resilience? 


In this blog we explore how much organisations should invest in cyber resilience to protect against cybercrime [...]

Shows the EU flags outside the summit

The European Cyber Resilience Act explained – how it impacts your business


On the 15th of September 2022, the European Commission published its proposal for new regulation regarding cybersecurity requirements for products with digital elements (such as smart fridges, cameras, TVs [...]

Person using a computer with cyber resilience in mind

What is cyber resilience? A complete guide


Firewalls and anti-virus software are just the first steps in protecting your organisation from cyber threats (this is cybersecurity). However, you need more than that and this is where [...]