No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Approximately 83% of organizations have experienced more than one data breach. (IBM Security 2022 Cost of a Data Breach Report) These...
Cyber Security
Is that really a text from your CEO, or is it a scam?
Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six £200 gift...
Business Email Compromise
The Challenge: Business Email Compromise is defined by the National Cyber Security Centre as a Phishing attack where the Cyber Criminals attempt to trick a senior executive into transferring funds or revealing sensitive information. The FBI defines the steps of the...
Setup and Management of Active Directory (AD) Conditional Access in the Cloud
The Challenge: In the Cloud, Microsoft defines modern security perimeters extending outside your network. The Solution: User and device identity, where companies have identity-driven signals incorporated as part of their access control. Conditional Access combines...
Technical Assistance with Cyber Essentials, Cyber Essentials Plus and ISO 27001
The Challenge: How do you keep your company’s “cyber hygiene” healthy? The UK Government’s Department for Digital, Culture, Media & Sport's Cyber Security Breaches Survey 2021 confirmed the awareness of Cyber Essentials among businesses stood at 14% with...
SIEM, Email & Microsoft 365 monitoring
The Challenge Evolving threats across your network? How do you detect abnormal behaviour? Start of a potential cyber-attack? How are you notified about security events to prevent cyber breaches? The Solution Technopedia defines Security Information and Event...
LAN Zero Trust Network Access (ZTNA)
The Challenge: Your Local Area Network (LAN) is subject to attacks; how do you protect it? In The State of Zero Trust Security 2021, 78% of companies worldwide have increased zero trust as a priority, with up to 90% working on zero trust initiatives. With emerging...
Internal IT Policy Templates
The Challenge: With every department having different IT priorities, how do you design an Internal IT policy? Chalkline recommends you review our previous articles on the importance of an Internal IT policy: Remote working: The importance of cybersecurity recommends...
Web Filtering
The Challenge: The internet is full of Malware, Phishing, Viruses, Ransomware and other malicious content. The Solution: Web Filtering is content control software restricting suspicious URLs on websites users visit. Using Web Filtering to block web threats, you can...