What is push bombing? Cloud account takeover has become a major problem for organizations. Think about how much work your company does that requires a username and password. Employees end up having to log into many different systems or cloud apps. Hackers use various...
Cyber Security
4 proven ways to prevent a data breach
No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Approximately 83% of organizations have experienced more than one data breach. (IBM Security 2022 Cost of a Data Breach Report) These...
Is that really a text from your CEO, or is it a scam?
Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six £200 gift...
Business Email Compromise
The Challenge: Business Email Compromise is defined by the National Cyber Security Centre as a Phishing attack where the Cyber Criminals attempt to trick a senior executive into transferring funds or revealing sensitive information. The FBI defines the steps of the...
Setup and Management of Active Directory (AD) Conditional Access in the Cloud
The Challenge: In the Cloud, Microsoft defines modern security perimeters extending outside your network. The Solution: User and device identity, where companies have identity-driven signals incorporated as part of their access control. Conditional Access combines...
Technical Assistance with Cyber Essentials, Cyber Essentials Plus and ISO 27001
The Challenge: How do you keep your company’s “cyber hygiene” healthy? The UK Government’s Department for Digital, Culture, Media & Sport's Cyber Security Breaches Survey 2021 confirmed the awareness of Cyber Essentials among businesses stood at 14% with...
SIEM, Email & Microsoft 365 monitoring
The Challenge Evolving threats across your network? How do you detect abnormal behaviour? Start of a potential cyber-attack? How are you notified about security events to prevent cyber breaches? The Solution Technopedia defines Security Information and Event...
LAN Zero Trust Network Access (ZTNA)
The Challenge: Your Local Area Network (LAN) is subject to attacks; how do you protect it? In The State of Zero Trust Security 2021, 78% of companies worldwide have increased zero trust as a priority, with up to 90% working on zero trust initiatives. With emerging...
Internal IT Policy Templates
The Challenge: With every department having different IT priorities, how do you design an Internal IT policy? Chalkline recommends you review our previous articles on the importance of an Internal IT policy: Remote working: The importance of cybersecurity recommends...