Cyber Security Articles

gears

Do I really need security policies?

Top 10 Policies A cyber security policy is a document that defines the measures and procedures for protecting an organisation’s...

Read full article

pagespeed

What is an Asset Register

The importance of asset management Asset management is critical to cybersecurity, risk management and cyber insurance. Organisations globally have spent...

Read full article

wood bricks

Do I need a maturity assessment?

Many organisations don’t fully understand their cyber security posture, business risks, and how to address them. It is like a...

Read full article

risk bar

Cyber Security Risk Assessment Checklist

Identify your risks to kick-start an awesome risk mitigation program What is a Cyber Security risk assessment? With threats to...

Read full article

happy coworkers

What questions should the board ask?

Questions the Board or Senior executives should ask the CIO / CISO. Do we know what data we hold and...

Read full article

stressed out woman

Measuring success of Social Engineering

How do you accurately measure the success of your security awareness phishing exercises? The best way to ensure that you...

Read full article

smiling man celebrating with hands up

What Are The ‘Essential 8’ Pillars of Cyber Security?

The Australian Cyber Security Centre’s – ACSC’s – Essential 8 risk management framework is a prioritized list of eight mitigation strategies for...

Read full article

happy coworkers

How do you measure the success of your security awareness phishing exercises?

The best way to ensure that you accurately measure the success of your security awareness simulated phishing exercises is to...

Read full article

credit card with lock

VULNERABILITY ASSESSMENT AND SURVEY PROGRAM

Overview of Assessment Methodology 1.    BENEFITS OF ASSESSMENT The vulnerability assessments and surveys provided by Cypro are an integral part...

Read full article

man working on his computer

Conscious vs. Unconscious – the determinants of security behaviour.

Have you ever wondered why you still fall for a simple social engineer attack, even after you have undertaken a...

Read full article

eyes

A funny story about habits.

I was running a security awareness training session for some executives of one of our customers recently, when I put...

Read full article

lock

Is Your Security Program Going Nowhere Fast?

Today’s security threats are real, and business risks are tangible. Yet, many organisations manage their security program in a way...

Read full article

Our cyber security experts are here to help

We work with businesses of all sizes to help them identify, and then manage their cyber security risks.