Hi! I'm Becca, Office Administrator. I head up the logistics here at Chalkline. My role consists of working closely with the Sales and Account Management team to ensure our clients have the very best products. I'm responsible for handling the client’s hardware...
Harry Boyne
LAN Zero Trust Network Access (ZTNA)
The Challenge: Your Local Area Network (LAN) is subject to attacks; how do you protect it? In The State of Zero Trust Security 2021, 78% of companies worldwide have increased zero trust as a priority, with up to 90% working on zero trust initiatives. With emerging...
Internal IT Policy Templates
The Challenge: With every department having different IT priorities, how do you design an Internal IT policy? Chalkline recommends you review our previous articles on the importance of an Internal IT policy: Remote working: The importance of cybersecurity recommends...
DNS & Web Filtering
The Challenge: The internet is full of Malware, Phishing, Viruses, Ransomware and other malicious content. The Solution: Web Filtering is content control software restricting suspicious URLs on websites users visit. Using Web Filtering to block web threats, you can...
Managed Phishing Tests & User education portal
The Challenge: In The Explosive Increase in Ransomware Attacks, Chalkline said Cyber Crime works on a ‘campaign’ level, beginning in almost all cases with a phishing email set to trick the victim into clicking a malicious link or file. Ransomware uploads into the...
Password Manager with SSO and BreachWatch
The Challenge: Passwords are currency for Cyber criminals. They are used in credential stuffing attacks, where they automatically place users’ credentials, a series of stolen usernames and passwords into login forms on websites in order to access the users’...
Monitoring for Dormant Accounts
The Challenge: In What is data security? What your finance firm needs to know Chalkline said financial services firms are 300 times more prone to IT security attacks than other sectors. Average costs of dealing with cybercrime incidents is higher in the financial...
Endpoint Device Vulnerability Scanning Assessment
The Challenge: In Remote working: The importance of cybersecurity, we explained how Cyber Criminals always find new ways to tap into networks that may be vulnerable, through tactics such as Phishing emails and scam SMS messages. They can harvest your company’s data...
BitLocker monitoring – protecting devices & data
The Challenge: Cyber criminals are always looking for new ways to access your company’s data. When they gain access to a device, how far would they be able to infiltrate? Which employees have a business need to access your data? The Solution: In our Think ahead –...