News

Inbox rules – those handy little tools for filing emails, categorising them, or possibly forwarding some emails to colleagues.  They exist in all email platforms, although with a prevalence of Exchange and Office 365, it is the Microsoft implementation that most of us know best.  If you have any admin knowledge of these platforms, you’ll also know that there are server side rules of a similar nature (known as transport rules or mailflow rules), which can do similar things for multiple people, or possibly the entire system.

Continue reading

Office 365 is the platform of choice for the vast majority of businesses today. Last year, 56.3% of companies were using Office 3651. 73.7% of enterprises (defined as 1000 seats upwards) are using Office 3652. According to Microsoft’s figures, at the end of 2018, there were 155 million monthly active users3. That’s a big number. But even more important – it is growing at approximately 3 million per month. So as a company deploying the solution, is this good news? Do you care?

Continue reading

“87%: Percentage of enterprises that say they require up to 50% more budget for cybersecurity”1

And who doesn’t want to spend more money?  It’s pretty hard to find a corporate function that doesn’t have a case for expanding their spend next year.  But 50%?  That’s insane, isn’t it?  Further on in the report on you will find that very few cyber leaders believe they will get anything like the budget they need.

Continue reading

Blog: Why the big MTTD?

“197 days: The average length of time it takes for organisations to identify a data breach”1

This statistic – meantimeto-detection (MTTD) comes up every year.  197 days is the 2018 figure, but it’s always quite big. It is marginally up on the previous year, up from 191 days. This begs two questions: why does it take so long to identify breaches, and are we even identifying all of them? 

Continue reading

Today, the number of events related to the Office 365 environment is effectively unlimited. IT teams are already saturated and security teams under-staffed in the face of this growing threat. The Security Operations Centre (SOC) is responsible for securing information – and this information is the core of Office 365’s communication and collaboration tools.

Continue reading

SC MEDIA, The Cyber-Security Source announced that IDECSI has been recognised as an Excellence Award finalist in the Best Emerging Technology category for its Personal Security Guardian at the SC Awards Europe 2019. Finalists are recognised for outstanding leadership and providing superior security products to the cybersecurity industry. Winners will be announced on the night at a black tie Gala Dinner to be held at the London Marriott Hotel, Grosvenor Square, on the evening of Tuesday 4 June.

Continue reading

Trust but Verify

“66% [of companies] say privileged users access sensitive or confidential data because of curiosity”1. Maybe I’m naive, but I find this quite shocking – two thirds of users with privileged access have looked at confidential data just because they can! And it’s not only insiders deliberately doing bad things, it can be simple error – I’ve come across a case where an IT admin was supposed to block an incoming email address, and accidentally BCCed the CEO’s incoming email to that address! For three days. Just pause on that for a second. The potential damage does not bear thinking about.

Continue reading

Pin It on Pinterest