ramsac team

IT Blog Category: Cybersecurity

What is a break glass account?

Cybersecurity

If you’re creating a business continuity plan, have you considered a break glass account? Learn what one is and how to create one here. [...]

Cybersecurity vs cyber resilience

Cybersecurity vs cyber resilience – what is the difference?

Cybersecurity

What’s the difference between cybersecurity and cyber resilience, and how can you implement them? We cover this and more. [...]

Celebrating 20 Years of Cybersecurity Awareness Month

Cybersecurity

October is Cybersecurity awareness month, follow us on LinkedIn or Twitter for daily tips on how you can protect your organisation against Cybercrime. [...]

Ramsac network monitoring cybersecurity

How much should businesses invest in cyber resilience? 

Cybersecurity

In this blog we explore how much organisations should invest in cyber resilience to protect against cybercrime [...]

Shows the EU flags outside the summit

The European Cyber Resilience Act explained – how it impacts your business

Cybersecurity

On the 15th of September 2022, the European Commission published its proposal for new regulation regarding cybersecurity requirements for products with digital elements (such as smart fridges, cameras, TVs [...]

Person using a computer with cyber resilience in mind

What is cyber resilience? A complete guide

Cybersecurity

Firewalls and anti-virus software are just the first steps in protecting your organisation from cyber threats (this is cybersecurity). However, you need more than that and this is where [...]

Person working remotely from their home

The cybersecurity risks of remote working

CybersecurityRemote working

Remote workers are under increasing levels of threat from advanced cyber criminals. It is vital to protect your workforce from cyberattacks. Discover more here. [...]

What is Mobile Application Management: streamlining app deployment and security

Cybersecurity

Mobile Application Management helps organisations to manage, secure, and distribute mobile applications within their environment. In this blog we explain what MAM is and the benefits of implementing it. [...]

ramsac fugitives office security

The importance of effective Supplier Data Security

Cybersecurity

In this blog post, we will explore essential considerations and questions to ask your suppliers about the protocols they have in place that keep you, and any shared data, [...]