ramsac team

IT Blog Category: Cybersecurity

ramsac fugitives office security

The importance of effective Supplier Data Security

Cybersecurity

In this blog post, we will explore essential considerations and questions to ask your suppliers about the protocols they have in place that keep you, and any shared data, [...]

What is Mobile Device Management?

Cybersecurity

Mobile Device Management is a type of software used by organisations to monitor, manage and secure employees’ mobile devices. In this blog we explain how to build a strong [...]

10 steps an organisation can take to mitigate cybersecurity risks

Cybersecurity

This blog post outlines 10 steps that an organisation can take to reduce its cybersecurity risks and enhance its resilience and recovery capabilities in case of a cyber incident. [...]

ramsac cybercovid 1 e1585644078953

MOVEit & Zellis data security attack puts thousands of employees at risk

Cybersecurity

The recent Zellis data breach exposed thousands of employees’ personal data to hackers using a zero-day flaw in MOVEit software, in this blog we give our top 5 tips [...]

Understanding the dangers of ‘Permission Creep’

Cybersecurity

This blog post explains what permission creep is, how it can expose sensitive data to unauthorised users, and what steps an organisation can take to prevent permission creep. [...]

Using cybersecurity training to reduce an organisation’s risk of a cyberattack.

Cybersecurity

Cybersecurity training is an important tool for organisations to prevent and mitigate cyberattacks, we explore the types of training available to organisations. [...]

The security risks of ChatGPT: how to stay safe with AI models

AICybersecurity

Artificial intelligence (AI) is a game-changing technology in this blog we explore the risks and benefits of using AI-powered language models such as ChatGPT [...]

ramsac MFA image blog

How secure is MFA based on SMS and Voice calls?

Cybersecurity

In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]

Secure password entered on website Zero Trust

Microsoft Office – High Severity Vulnerability

Cybersecurity

Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]