Chalkline IT Blogs
Timely IT Insights and Perspectives
Explore Chalkline IT Blogs


Explore Chalkline IT Blogs
Password Manager with SSO and BreachWatch
The Challenge: Passwords are currency for Cyber criminals. They are used in credential stuffing attacks, where they automatically place users’ credentials, a series of stolen usernames and passwords into login forms on websites in order to access the users’...
Monitoring for Dormant Accounts
The Challenge: In What is data security? What your finance firm needs to know Chalkline said financial services firms are 300 times more prone to IT security attacks than other sectors. Average costs of dealing with cybercrime incidents is higher in the financial...
Endpoint Device Vulnerability Scanning Assessment
The Challenge: In Remote working: The importance of cybersecurity, we explained how Cyber Criminals always find new ways to tap into networks that may be vulnerable, through tactics such as Phishing emails and scam SMS messages. They can harvest your company’s data...
BitLocker monitoring – protecting devices & data
The Challenge: Cyber criminals are always looking for new ways to access your company’s data. When they gain access to a device, how far would they be able to infiltrate? Which employees have a business need to access your data? The Solution: In our Think ahead –...
Workstation Baselining – keep to security standards
The Challenge: Installing a new device for a new employee? If so, have you set a minimum-security baseline? Cyber Criminals review LinkedIn, looking for profiles where people have recently changed companies. If they target your new employee’s devices, are you...
Third Party Patching
The Challenge: Third Party Apps may be the weakest link in your company’s security. Your devices will run plenty of Third Party Apps - if you look at your programs installed you'll see Adobe Reader, Java, Google Chrome to name a few. With so many different...
365 tenant monitoring – securing the cloud
The Challenge: Breaches can happen at any time. How do you ensure breaches don’t compromise your network? What happens if you accidently stumble across a malicious website, exposing you to malware? How do you prevent, detect and recover from human error? The...
Managed multi-factor authentication
The Challenge: In The Explosive Increase in Ransomware Attacks, Chalkline said Ransomware was by no means new, but with a national lockdown keeping workers away from their usual office environment, Cyber Criminals saw a new wave of unprotected and unaware victims to...
Outbound mail-flow security (DMARC, DKIM, SPF) – reporting to protect impersonation
The Challenge: You receive an email from a client, there is something strange about it. Do you open it? What if your client received an identical email pretending to be from you? Both you and your client open the identical email from the Cyber Criminal, launching...
M365 Backup – it’s now about multi cloud
The Challenge: What if your system crashes and your data disappears or is not acessible? In Remote working: The importance of cybersecurity Chalkline discussed how transferring data across multiple devices makes it vulnerable as increased movement increases the...
Email AI Security – the future of security
The Challenge: Phishing is on the rise and Cyber Criminals are regularly attempting to compromise your accounts. The number of ransomware attacks increased by 62% between 2019 and 2020. What exactly is Phishing? Effectively, you are attacked and often, sent a spoofed...
Email gateway security – the first line of defence
The Challenge: Imagine the security guard at your Head Office, Email gateway security manages and filters content before allowing emails to be received into your inbox. Before entering your company, every email is managed and filtered for: Email-borne viruses spread...












