<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/cyber-security/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #Cyber Security</title><description>ActiSoft Technology - Blog #Cyber Security</description><link>https://www.actisofttechnology.com/blogs/tag/cyber-security</link><lastBuildDate>Wed, 22 Apr 2026 04:26:00 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[7 Reasons Why You Need a Password Manager]]></title><link>https://www.actisofttechnology.com/blogs/post/7-reasons-why-you-need-a-password-manager</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-528286738.jpg"/>Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways f ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__r401yj7QKqEYUGntCz9ww" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm__r401yj7QKqEYUGntCz9ww"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways for cybercriminals. They exploit lists of commonly used passwords and employ simple hacking tools to guess their way into accounts. Imagine someone getting rich by cracking passwords and draining bank accounts.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Monitoring your employees' password habits can be a daunting task without a password management solution in place. A business password manager grants organisations full control and oversight of their employees' password behaviours. The process of onboarding and offboarding employees is also streamlined. Continue reading to discover the functions of a password manager and how it can advantage your organisation.</p></div></div>
</div><div data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:4pt;"><span style="color:inherit;">What Is a Business Password Manager?</span><br></p></div></h2></div>
<div data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>A business <a href="/password-manager" title="password manager" rel="">password manager</a> is a tool that enables you and your employees to track, store, share, protect, and manage all passwords. Passwords are kept in a secure, cloud-based digital vault, accessible only with a master password. This vault can also store more than passwords, including documents, identity cards, and SSH keys, thus streamlining the security of your employees' files and passwords. Additionally, a password manager facilitates the creation of strong, unique passwords for each account, securely storing them.</div></div><br><div>Password managers play a vital role in maintaining the security of your organisation and simplifying the management of your employees' passwords. They also negate the need for employees to submit help desk tickets for password resets.</div></div></div>
</div><div data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width: 1095px ; height: 365.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:723px ; height:241.00px ; } } @media (max-width: 767px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:415px ; height:138.33px ; } } [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/password-manager" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Keeper%20Email%20Banner%201.png" width="415" height="138.33" loading="lazy" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_2pbKfceujRzzEBVqQE6YKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2pbKfceujRzzEBVqQE6YKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Benefits of Having a Password Manager For Your Organisation</span></h2></div>
<div data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Unsure of how a password manager can benefit your organisation? Consider these six advantages of deploying a business password management solution.</span><br></p></div>
</div><div data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">1. Enforce Organisation Password Policies Efficiently</span></blockquote></h2></div>
<div data-element-id="elm_DfFAlHKLU_028c7sd8RgBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DfFAlHKLU_028c7sd8RgBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Centralising password management within a single platform enables organisations to standardise and implement password security policies throughout the organisation. This includes setting a minimum password length and mandating the use of Multi-Factor Authentication (MFA) for every compatible site.</div><br><div>Employing a password manager permits IT administrators to verify compliance with organisational password policies among all employees.</div></div></div>
</div><div data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">2.&nbsp;</span><span style="color:inherit;">Visibility Into Password Practices</span></blockquote></h2></div>
<div data-element-id="elm_8uXirloSpijWoBC0HL6HZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8uXirloSpijWoBC0HL6HZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Without centralised password management, IT administrators lack insight into employees' password habits. This issue of visibility is increasingly critical with the rise of remote work. It will prevent your employees reusing the same password across various sites and applications. Password managers offer a centralised console that grants administrators full visibility into employees' password practices, regardless of whether they are working in the office, remotely, or using a hybrid approach. Don’t worry the IT administrators cannot see the passwords in a user’s vault.</span></p></div>
</div><div data-element-id="elm_EQAi45Nr5HB-alN0WUudaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_EQAi45Nr5HB-alN0WUudaA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_U_uLuctunncA7OsLW5_Hmg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_U_uLuctunncA7OsLW5_Hmg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">3. Securely Share Passwords&nbsp;</span></blockquote></h2></div>
<div data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In businesses, password sharing is essential and crucial for task completion, yet it's imperative that employees have a secure method to share these passwords with their team. A password manager serves this purpose effectively. It enables organisations to establish shared folders for various groups such as individual departments or project teams. Moreover, users can securely share credentials with designated individuals, with the added convenience of automatic credential transfer to the recipient's vault.</div><br><div>Furthermore, our offering of Keeper's password manager provides the option to dictate whether the recipient of shared credentials or folders has the permission to edit or merely view the shared items.</div></div></div>
</div></div><div data-element-id="elm_XPAwacO4FMzxcmRckDloMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XPAwacO4FMzxcmRckDloMA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width: 251px ; height: 324.63px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:723px ; height:935.10px ; } } @media (max-width: 767px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:415px ; height:536.75px ; } } [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/PasswordManagementisCriticaltoYourCybersecurityStr/formperma/awFQlzTQXwg6Q22TZVFF_x9th1kmEpO1iuL5wLvAQzk" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Management%20is%20Critical%20to%20Your%20Cybersecurity%20Strategy.png" width="415" height="536.75" loading="lazy" size="fit"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">4. Implement Role-Based Access Control (RBAC)</span></blockquote></h2></div>
<div data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Employees should be granted only the system access necessary for their job functions, nothing more, this is the Principle of Least Privilege. This not only aids in preventing insider attacks but also reduces organisational risk if an employee's account is compromised. Adopting a standardised password management solution allows organisations to enforce Role-Based Access Control (RBAC) and keep track of account activities for any unusual behaviour that might suggest misuse or a security breach.</span><br></p></div>
</div><div data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">5. Dark Web Monitoring</span></blockquote></h2></div>
<div data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cybercriminals often target Software as a Service (SaaS) developers and other vendors, aiming to steal credentials from their clients' employees. It may take months for an organisation to detect a breach, and usually, the victims of these third-party breaches are the last to realise they've been compromised. Meanwhile, cybercriminals might have already sold the stolen login credentials on the dark web.</div><br><div>BreachWatch, a widely-used extension for Keeper's password manager included in our Enterprise offering, monitors dark web forums and alerts organisations in real-time if any employee passwords or credentials appear online. It integrates smoothly with the Keeper password management platform, allowing IT administrators to promptly enforce password resets.</div></div></div>
</div><div data-element-id="elm_WrMBI_OsWneprZyFTFbpxg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WrMBI_OsWneprZyFTFbpxg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uuGm17GHqiTTsNXtihj0OA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width: 439px ; height: 621.04px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:723px ; height:1022.81px ; } } @media (max-width: 767px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:415px ; height:587.09px ; } } [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/The-Future-of-Defense-infographic-EN.png" width="415" height="587.09" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">6. Simplified employee onboarding and offboarding</span></blockquote></h2></div>
<div data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The use of a uniform password manager streamlines the onboarding process for new hires, facilitating a smooth transition even when the team is partially or fully remote. IT administrators can efficiently prepare new employees for work within minutes by either manually registering each one via the admin console or enrolling multiple users simultaneously using Keeper's supported methods. New employees are welcomed with a personalised email invitation containing a link to set up their Keeper Vault.</div><br><div>Former employees retaining active passwords pose a significant cyber risk, and securing passwords during the offboarding process is vital to an organisation's cybersecurity infrastructure. Upon an employee's departure, their system access must be revoked without delay. Password managers not only enable IT administrators to promptly withdraw access from ex-employees but also offer the option to conceal passwords for current employees within the platform. This measure prevents the copying of passwords through screenshots or written notes and facilitates the secure handover of accounts to successors.</div></div></div>
</div></div></div><div data-element-id="elm_jDrQvhd34KlHdgql0kWmnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jDrQvhd34KlHdgql0kWmnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">7. Helpdesk Tickets</span></blockquote></h2></div>
<div data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is estimated that 40% of help desk calls/tickets pertain to password resets, each costing the business approximately £60. Envision a scenario where a multitude of employees are synchronised on a 90-day password renewal cycle; the impact on productivity could be substantial.</div><br><div><div>IT support teams can be targeted with <a href="/social-engineering" title="social engineering" rel="">social engineering</a> attacks aimed at password resets, they typically rely on static data to confirm an employee's identity, a password manager such as Keeper mitigates that risk.</div></div><br><div>Consider the potential accomplishments of your support team with a decrease in password reset calls/tickets!</div></div></div>
</div><div data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Choosing Keeper as Your Organisation’s Password Manager</span></h2></div>
<div data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Keeper's Enterprise password management solution offers all the essential features required in a password manager, plus many additional benefits. The Keeper password manager operates on a zero trust and zero knowledge basis, ensuring that only the end user can access the plain-text data in their Keeper vault—Keeper's employees included.</div><br><div>With Keeper for Business, every employee receives Keeper across an unlimited number of devices, ensuring comprehensive protection throughout the company. Moreover, it includes a complimentary family plan for every employee.</div></div></div>
</div><div data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Contact our friendly Cyber Security specialists at Actisoft today to find out how Keeper Password Manager can help you improve your security posture and protect your users and organisation.</span><br></p></div>
</div><div data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/KeeperPasswordManager/formperma/905BpiQiQbXnwngYU5Ze23gRzb7UGx4G0hvTnsTcurI"><span class="zpbutton-content">Get Started Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 Jun 2024 12:42:22 +0000</pubDate></item><item><title><![CDATA[The Hidden Cost of Cyber Crime And How to Avoid it]]></title><link>https://www.actisofttechnology.com/blogs/post/the-hidden-cost-of-cyber-crime-and-how-to-avoid-it</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-864427926.jpg"/>When a new story hits the news about another organisation being hit by a cyber attack, it’s mostly numbers we hear about. We’re told how many records ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 500.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:500.00px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:500.00px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-851982190.jpg" width="500" height="500.00" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>When a new story hits the news about another organisation being hit by a cyber attack, it’s mostly numbers we hear about. We’re told how many records were compromised, how many hours were lost, how much ransom money was demanded and how big a fine the company will have to pay to the ICO.&nbsp;</div><br><div>What we don’t hear so much about is the human cost of cyber attacks, or how those responsible for handing over valuable data (mostly completely innocently) feel about their mistakes.&nbsp;</div><br><div>Fraudsters know how to play on people’s weaknesses, and they’re very good at it. It’s easy to think you’d never fall for a scam if it’s never happened to you, but the truth is that hundreds of thousands of people do get caught out every year. Often, those people are highly intelligent, organised and diligent, and&nbsp; just happened to be having a bad day.&nbsp;</div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_iTiXhIfBNKriYWqJuECdGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iTiXhIfBNKriYWqJuECdGw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Being tired, overworked, stressed or simply relaxing in the lead up to a holiday can cause even the brightest spark to make simple mistakes. Nobody is immune to cyber attacks, and hackers capitalise on that fact every single day. The situation is now so serious that mental health professionals are referring to cyber crime as a new, hidden epidemic, and those who fall victim to hackers often pay a heavy <a href="https://www.zdnet.com/article/it-is-stressful-it-is-frightening-what-its-like-to-be-a-victim-of-hacking-and-ransomware/" title="psychological price." target="_blank" rel="">psychological</a><a href="https://www.zdnet.com/article/it-is-stressful-it-is-frightening-what-its-like-to-be-a-victim-of-hacking-and-ransomware/" title="psychological price." target="_blank" rel=""> price.</a> It goes way beyond having information stolen or even handing over money. It’s about deep-seated feelings of guilt, embarrassment and powerlessness, and in an increasing number of cases victims are being diagnosed with depression, post traumatic stress disorder or other related health problems.</span><br></p></div>
</div><div data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>A recent <a href="https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime" title="survey" target="_blank" rel="">survey</a> found that almost 70% of victims said they felt they could no longer trust strangers, and over half said they were no longer able to enjoy the activities they used to. Depression and anxiety were reported in over half the respondents, with almost 85% experiencing insomnia following a data breach. More than 60% said they experienced difficulties with concentration and cognitive function, while just under 57% said they regularly experienced aches, pains and headaches.&nbsp;</div></div><br><div>In severe cases, the shame of compromising company data and being seen as “the weakest link” in an organisation has even led to suicide. So, how do you protect your employees and your company from the chaos of a data breach? These 7 simple security measures will help keep you and your people safe and help you avoid the long term repercussions of cyber crime.</div></div></div></div>
</div></div><div data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" title="FREE Trial" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_160x600.jpg" width="160" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-weight:700;">1. Make Sure You Have Endpoint Protection Software on Every Device</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>A lot of people still think that anti-virus software is just for laptops and PCs, but you should have it installed on every device on which people access your systems.&nbsp;</div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-weight:700;">2. Use Different Passwords</span></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div><div>Many of us are guilty of re-using the same password for different accounts, but it’s a really bad habit to get into. Having to remember different passwords for all your online activities can be exhausting and frustrating, but if you use a system like <a href="/password-manager" title="Keeper" target="_blank" rel="">Keeper</a> you won’t have to. <a href="/password-manager" title="Password management systems" target="_blank" rel="">Password management systems</a> remember everything for you, so you and your team can stay safe without having to deal with an administrative nightmare.</div></div><br></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-weight:700;">3. Switch to Multi-factor Authentication&nbsp;</span></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div>Entering a username and password is just one step in the online security process, so more and more organisations are choosing to protect their data with several layers of protection. Multi-factor authentication requires you to provide more information to confirm your identity, such as:</div><div><ul><ul><li><span style="color:inherit;">Something you know – a password or PIN</span></li><li>Something you have – like a&nbsp;<span style="color:inherit;"><a href="/security-keys" title="Security Key" target="_blank" rel="">Security Key</a>,&nbsp;</span>secure USB or phone number<br></li><li>Something you are – such as a fingerprint or retina scan&nbsp;<br></li></ul></ul></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div><span style="font-weight:700;color:inherit;">4. Protect Every Device</span><br></div><br><div>One of the downsides of&nbsp; remote working is that your team members will most likely be using their own devices to log into your network. It’s imperative to clearly outline everyone’s responsibilities when it comes to looking after those devices, from keeping them safe on public transport to ensuring nobody else has access to them.&nbsp;</div><br><div><div>You’ll need a robust Bring Your Own Device (BYOD) policy in place to ensure everyone knows what’s expected of them – get advice on how to create one <a href="https://www.ncsc.gov.uk/collection/device-security-guidance/bring-your-own-device" title="here." target="_blank" rel="">here.</a>&nbsp;</div></div><br><div>It's important to note that under the GDPR, if any device containing personal information is stolen it must be reported to the ICO within 72 hours. It’s also a good idea to install tracking software on your devices so they’re easier to get back in the event of theft or loss.&nbsp;</div><br><div><span style="font-weight:700;">5. Make Sure Your Software is Always Up to Date</span></div><br><div>One of the easiest ways for hackers to infiltrate organisations is through outdated software. Every time someone hits the “update later” button it makes your organisation more vulnerable, so make it policy to ensure all software is updated at the same time every week.</div><br><div><span style="font-weight:700;">6. Back up Regularly&nbsp;</span></div><br><div>Even if the worst does happen and you lose your data, it will be a whole lot easier to deal with if you’ve got everything backed up in another place. You can store copies of your data in an external hard drive, but most businesses nowadays choose to back up in the Cloud. A good security provider will perform backups on your behalf and regularly monitor activity on the network, which means you won’t have to give it a second thought.&nbsp;</div><div><br></div><div>Don't forget to test your backup regularly!</div><br><div><span style="font-weight:700;">7. Educate and Support Your Staff</span></div><br><div>This is the number one most important thing you can do when it comes to cyber security. Human error is the biggest cause of data breaches, so by keeping everyone trained and up to date with the latest phishing threats and how to recognise them, you’ll be going a long way towards keeping your customer information safe.&nbsp;</div><br><div>With the right training, employees should all be able to spot a phishing email or dodgy link and know what to do if something doesn’t look right. It’s also important to create a culture in which people feel comfortable to ask if they’re not sure about something, and don’t feel under too much pressure. Of course, an element of pressure is expected in every job, but when people are overloaded, they’re more likely to make mistakes. And as we’ve already seen, sometimes those mistakes have far reaching consequences. Creating a culture of fear won’t work, but providing a supportive, educational environment just might.</div><br><div>We are here to help you and your team stay safe online. To find out more, or to book a cyber security training session, contact us today.</div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Endpoint &amp; DNS Protection Together</h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus and s</span><span style="color:inherit;">ecure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk.</span><br></p></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 350px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_300x350.jpg" width="300" height="350" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Why it's different:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="font-size:18px;">Stop sophisticated cyber attacks</span></li><span style="font-size:18px;"><li>Streamline Management<br></li><li>Save time and money</li><li>Skip the hardware and software with our DNS Protection</li><li>Block threats at the domain level</li><li>Reduce costs relating to infections</li><li>Protection wherever you are</li></span></ul></div>
</div></div></div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank"><span class="zpbutton-content">Try it now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 04 Apr 2022 14:34:15 +0000</pubDate></item><item><title><![CDATA[How To Harness the Power of Data in Your Organisation ]]></title><link>https://www.actisofttechnology.com/blogs/post/how-to-harness-the-power-of-data-in-your-organisation</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-637242422s-1.jpg"/>Companies all over the world are learning that one of the best ways to future-proof their organisations is by harnessing the power of data. According ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 333.20px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:333.20px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:333.20px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g777ffc8a5a81985b6a9b3fcb76212a9c1e5f2f194665e0186a208189830e61a623f820033c87ec9301c73ce30d9a19993b1050eff3b6034062ce31c17ee1ef18_1280.jpg" width="500" height="333.20" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div>Companies all over the world are learning that one of the best ways to future-proof their organisations is by harnessing the power of data. According to a recent survey from <a href="https://www.mckinsey.com/business-functions/people-and-organizational-performance/our-insights/organizing-for-the-future-nine-keys-to-becoming-a-future-ready-company" title="McKinsey" target="_blank" rel="">McKinsey</a>, today’s leaders understand that data isn’t just part of business, it is business. But there’s a big difference between simply collecting data and using it properly, so how do you ensure you’ve got all the information you need to succeed without getting bogged down in statistics?&nbsp;</div></div><br><div>For most companies, data collection is about three things:</div></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><ul><ul><li>Informing and improving decision making</li><li>Refining operations</li><li>Creating new revenue streams</li></ul></ul></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_d3oC93lZYgiGkIQSGu4x6w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_d3oC93lZYgiGkIQSGu4x6w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Informing and Improving Decision Making&nbsp;</span></h3></div>
<div data-element-id="elm_iTiXhIfBNKriYWqJuECdGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iTiXhIfBNKriYWqJuECdGw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A recent study by <a href="https://www.bain.com/insights/big_data_the_organizational_challenge" title="Bain &amp; Company," target="_blank" rel="">Bain &amp; Company,</a> which looked at over 400 organisations, found that those who used advanced data analytics made decisions five times quicker than their peers. Data helps us understand the way our customers think and provides deep insights into which processes are working, as well as those that would benefit from a different approach.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_CMV6BZlhD9Vn89jdUrv4UQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CMV6BZlhD9Vn89jdUrv4UQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Refining Operations</span></h3></div>
<div data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Today’s data sources allow organisations to refine everyday operations and processes and work more efficiently. From customer feedback to production line reports, we now have a host of information at our fingertips to help us be bigger and better than ever.</div><br><div>A good example of this is the use of GPS software in delivery vehicles – companies like Amazon have used this new technology to their full advantage, giving customers and managers alike regular updates on deliveries. They’ve also used data in all sorts of ways to influence customer decisions, like the recently introduced Personal Recommendation system that prompts consumers on the products they might need, before they even know it&nbsp; themselves.&nbsp;</div></div></div>
</div></div><div data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" title="FREE Trial" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_160x600.jpg" width="160" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_n6HF4QdNZpL5YbBfRgZ2pg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_n6HF4QdNZpL5YbBfRgZ2pg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Creating New Revenue Streams</span></h3></div>
<div data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The more in-depth and interesting your data, the more attractive a business asset it becomes. So much so that companies are now being bought based on how much data they collect, like in the case of IBM’s takeover of The Weather Company. Originally founded as the Weather Channel in 1982, the company invested in technology that allowed it to offer an impressive line of digital products. They changed their name to the Weather Company in 2012 and a number of eagle-eyed investors noticed the wealth of information they had collected about weather patterns. IBM soon snapped them up and has since been able to position itself as one of the leading suppliers of weather information in the world. Even if you don’t want your company to be acquired by one of the big fish, your data will still be valuable to someone.&nbsp;</div><br><div>However far along you are in your journey, you’ll need a robust data strategy in place. Before you go on a mission to collect all those facts and figures , it’s important to know what you want to do with it. That means starting with a robust data strategy that clearly identifies what you’re trying to achieve and how you plan to do it.</div><br><div>The amount of data that exists around the globe is growing rapidly – 90% of it has only become available over the past couple of years. As that data continues to increase, managing it properly has become essential, which is why all businesses need a data strategy.&nbsp;</div><div><div style="color:inherit;"><div><ul><ul><li>Like all business planning activities, your company data strategy should be SMART and flexible, allowing you to scale up and down according to need.</li><li>Without a data strategy in place, different departments and team members find themselves having to make decisions about information and solve data decisions on their own. This adds up to confusion and a lot of wasted time and money, so it’s important to develop clear guidelines in order to keep costs low and operations running smoothly.&nbsp;</li><li>Define how your data will help you meet business goals.</li><li>Identify how you will complete data collection activities in line with those goals.</li><li>Outline any changes you need to make within your organisation to make the most of your data.</li><li>Establish a timeline for all your data collection activities and milestones.</li><li>Describe your short-, mid- and long-term data collection strategies.</li><li>Discuss how these activities can be financially justified.</li><li>Identify what software you intend to use and how your insights can be monetised.</li><li>Include information about how your data will be stored and kept safe.</li></ul></ul></div><br><div><span style="color:inherit;">Data Security should be your number one priority when it comes to collecting any kind of information. Since the introduction of the GDPR and the ever-increasing risk of hacking, it’s never been more important to make sure your data is safe. Here are some important things to consider for your new data strategy:</span><br></div><div><div style="color:inherit;"><div><ol><ol><li>Always make sure your data is regularly backed up</li><li>Ensure all your staff are well trained in cyber security and clear about access and data sharing</li><li>Use Cloud computing systems to keep your information remotely</li><li>Invest in some reliable Antivirus software and install it on all devices that access your systems</li><li>Always keep your data protected with a robust cyber security strategy</li></ol></ol></div><br><div><span style="color:inherit;">We are here to help you keep your data safe. Contact us today to find out more about our cyber security products and services, including data strategy implementation and staff training.&nbsp;</span><br></div></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Endpoint &amp; DNS Protection Together</h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus and s</span><span style="color:inherit;">ecure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk.</span><br></p></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 350px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_300x350.jpg" width="300" height="350" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Why it's different:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="font-size:18px;">Stop sophisticated cyber attacks</span></li><span style="font-size:18px;"><li>Streamline Management<br></li><li>Save time and money</li><li>Skip the hardware and software with our DNS Protection</li><li>Block threats at the domain level</li><li>Reduce costs relating to infections</li><li>Protection wherever you are</li></span></ul></div>
</div></div></div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank"><span class="zpbutton-content">Try it now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Mar 2022 13:40:01 +0000</pubDate></item><item><title><![CDATA[79% of Employees Have Knowingly Engaged in Risky Online Activities in the Past Year]]></title><link>https://www.actisofttechnology.com/blogs/post/79-of-employees-have-knowingly-engaged-in-risky-online-activities-in-the-past-year</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1208529039.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman With employees not believing that it’s important to personally worry about cyber security risks, they ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"] .zpimagetext-container figure img { width: 500px ; height: 333.33px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"] .zpimagetext-container figure img { width:500px ; height:333.33px ; } } @media (max-width: 767px) { [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"] .zpimagetext-container figure img { width:500px ; height:333.33px ; } } [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1611095566888-f1446042c8fc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDI2fHx3b3JrJTIwZnJvbSUyMGhvbWV8ZW58MHx8fHwxNjI5MjE1MTk5&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" width="500" height="333.33" loading="lazy" size="medium" data-lightbox="false" style="width:1080px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>With employees not believing that it’s important to personally worry about cyber security risks, they also tend to believe they’re not a target, new data suggest as the reason for the risky behaviour.</div><div></div><br><div>In most cyberattacks, the employee plays some role – clicking on a malicious attachment, giving up their corporate credentials to an impersonated logon page on the web, or taking specific action because they were fooled into believing their CEO or boss told them to. So, it’s important for employees to not engage in risky online behaviours.</div></span></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"] .zpimagetext-container figure img { width: 300px ; height: 600.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"] .zpimagetext-container figure img { width:300px ; height:600.00px ; } } @media (max-width: 767px) { [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"] .zpimagetext-container figure img { width:300px ; height:600.00px ; } } [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600.00" loading="lazy" size="medium" data-lightbox="false" style="width:300px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><div>But according to new data from security vendor Thycotic, employees simply aren’t prepared and educated to think about corporate risk, let alone their role in helping to mitigate that risk. In their newly released <a href="https://thycotic.com/resources/global-cyber-security-research-results-2021/" title="Balancing Risk, Productivity and Security" target="_blank" rel="">Balancing Risk, Productivity and Security</a> report, Thycotic point out some specific insights that clearly point to how and why employees are creating risk:</div></div><div><ul><ul><li>45% see the organisation being at little or no risk of cyberattack</li><li>51% say IT should be solely responsible to protect the organisation from cyber threats</li><li>79% of employees have engaged in one or more risky activities that include sharing credentials with colleagues, using the same password across multiple sites, using unauthorised personal devices to conduct work, and allowing family members to use their corporate device</li></ul></ul></div><br><div><div>One of the reasons is clear from the report’s data: 56% of employees have received no <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> in the last year. Over half of employees aren’t having the concept of needing to be vigilant continually reinforced – so it’s no wonder these organisations are seeing employees introduce risk regularly.</div></div><br><div></div><div>If you want a vigilant and cyber security-minded employee, you need to continuously teach them about the importance of cyber vigilance. Otherwise, you’re going to end up with an organisation that is demonstrated by the Thycotic data.</div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"] .zpimagetext-container figure img { width: 300px !important ; height: 238px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"] .zpimagetext-container figure img { width:300px ; height:238px ; } } @media (max-width: 767px) { [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"] .zpimagetext-container figure img { width:300px ; height:238px ; } } [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" width="300" height="238" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 18 Aug 2021 15:01:00 +0000</pubDate></item><item><title><![CDATA[BEC Attacks Are Targeting Lower-Level Employees]]></title><link>https://www.actisofttechnology.com/blogs/post/bec-attacks-are-targeting-lower-level-employees</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-668224090s.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman A new report from Barracuda found that most business email compromise (BEC) attacks are now targeting ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1079995870.jpg" size="medium" data-lightbox="false" style="width:791px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>A new report from Barracuda found that most business email compromise (BEC) attacks are now targeting employees who aren’t in executive or financial roles.</div><br><div>“Many organisations focus their training and protection on who they perceive to be the most targeted individuals within the organisation—usually executive and finance teams,” Barracuda’s researchers write. “However, 77% of BEC attacks targeted employees in other departments. Attackers look for an entry point and a weak link within your organisation, and then they work their way to more valuable accounts. This highlights the need to secure and educate every employee to the same level.”</div></span></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="medium" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><span style="font-weight:700;">Barracuda also found that one in five BEC attacks target employees in sales roles.</span></div><br><div></div><div>“Due to the nature of their role, sales reps are used to getting external messages from senders they haven’t communicated with before,” the researchers write. “At the same time, they are all connected with payments and with other departments including finance. For hackers, these individuals could be a perfect entry point to get into an organisation and launch other attacks.” They also have access to a lot of contacts</div><div><br></div><div><span style="font-weight:700;">IT departments were another prime target, with each IT employee being targeted by an average of forty attacks.</span></div><span style="font-weight:700;"><div></div></span><br><div>“When we look at the number of phishing emails targeting IT teams, although they received only 5% of the total number of attacks, each employee was targeted by 40 email attacks, which is well above average,” the researchers write. “IT staff has access to business-critical applications, so compromising their accounts can be extremely valuable to hackers as it will give them access to organisations’ security and IT infrastructure. Cybercriminals tailor their attacks to their victims, so there were barely any BEC attacks, which usually look for quick monetary return, targeting IT teams. However, when it comes to attacks that include phishing URLs designed to compromise accounts, IT was one of the top targets.”</div><br><div></div><div><div>New-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> can enable employees throughout your organisation to recognise and thwart <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.</div></div><br><div></div><div><div>Barracuda has the full <a href="https://assets.barracuda.com/assets/docs/dms/spear-phishing_report_vol6.pdf" title="story" target="_blank" rel="">story</a>.&nbsp;</div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 18 Aug 2021 07:40:00 +0000</pubDate></item><item><title><![CDATA[U.K. Employees Pose a Major Cybersecurity Risk to Business as They Return to the Office]]></title><link>https://www.actisofttechnology.com/blogs/post/u.k.-employees-pose-a-major-cybersecurity-risk-to-business-as-they-return-to-the-office</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1593642532781-03e79bf5bec2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wxfDF8c2VhcmNofDh8fHdvcmslMjBmcm9tJTIwaG9tZXxlbnwwfHx8fDE2Mjc1NjA4OTI&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman After well over a year of getting used to working from home, as U.K. employees look to head back into ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-687657898s-1.jpg" size="medium" data-lightbox="false" style="width:724px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>After well over a year of getting used to working from home, as U.K. employees look to head back into the office, new data shows they don’t see themselves as a cyber risk (which makes them one!)</div><br><div><div>The case has already been made that <a href="https://www.tessian.com/resources/back-to-work-cybersecurity-behaviors-report/" title="remote employees have adopted bad cybersecurity habits while working from home" target="_blank" rel="">remote employees have adopted bad cybersecurity habits while working from home</a>. It, therefore, makes sense that employers need to be aware of this and take precautions to ensure employees realise that cybersecurity is more important than when the pandemic started.</div></div></span></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><div>Data from security vendor Armis points out this same issue exists throughout the world. In a <a href="https://www.itsecurityguru.org/2021/07/21/back-to-work-onslaught-of-personal-devices-could-pose-serious-cybersecurity-risk/" title="survey of 2,000 UK employees" target="_blank" rel="">survey of 2,000 UK employees</a>, it appears that British users are the same as their U.S. counterparts:</div></div><div><ul><ul><li>61% of U.K. employees use their personal mobile phone and 44% use their own laptop for business purposes</li><li>25% admit to having insufficient security in place on their personal devices</li><li>61% intend to return to the office with those same personal devices</li><li>60% don’t believe their personal devices represent a threat</li></ul></ul></div><br><div>All this spells danger for organisations, as we obviously have a material portion of users thinking they are simply going to bring their admittedly insecure devices back into the workplace and continue to use them.</div><div></div><br><div><div>It’s critical that organisations have a cybersecurity component to their “return to work” plan – one that addresses device security, acceptable use of company resources (including Internet access), and <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> to elevate these remote employees’ sense of organisational vigilance against cyberthreats to an acceptable and effectual level.</div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 29 Jul 2021 12:15:10 +0000</pubDate></item></channel></rss>