Play
Play
Rob Pooley

Saepio’s InfoSec Summary of 2019 and Expectations for 2020

It has been a strong year for Saepio with new recruits, a new office, a new website (www.saepio.co.uk), updated branding and 4 industry awards, most notably being crowned IT’s ‘Rising Star’ in November.  We look forward to the next decade establishing ourselves as a go to trusted UK firm for InfoSec services and solutions.  Your feedback on our annual summary and future expectations is welcome!
Play
Play
Joe Hedegaard Ganly

Business Email Compromise Guide

Business Email Compromise can impact your company assets, your supply chain, your customers and your brand.  These fraudulent emails are getting more sophisticated, more regular, more targeted and more difficult to detect. Ultimately they are causing businesses of all sizes significant losses.
Play
Play
Joe Hedegaard Ganly

Government Cyber Security Breaches Survey 2019

In April 2018 The UK Government in conjunction with Ipsos MORI, has surveyed businesses and charities to find out they approach cyber security and help them learn more about the cyber security issues faced by industry.

The overwhelming majority of businesses and charities are reliant on online services, which exposes them to cyber security risks.

Virtually all UK businesses (98%) represented in the survey rely on some form of digital communication or services, such as staff email addresses, websites, online banking and the ability for

Play
Rob Pooley

How to recover from a cyber attack

More companies are falling victim to cyberattacks as a wide range of harmful software, social engineering schemes and scams threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the increase every year, it is important for businesses of all sizes to have a recovery plan in place to mitigate any losses.

In the unfortunate event of a data breach, these are the steps you should take to recover.

Identify and contain the problem

On average, companies do not know about data breaches or

Play
Play
Sean Wright

Saepio’s Guide to Trusted Access

Trusted Access is a Cyber Security Essential.

You need to ensure that only the right people and the right devices have access to your valued systems and data, this becomes even more important if your estate includes public and private cloud applications.

A user name and password are no longer sufficient to ensure integrity of access, Multi-Factor authentication is the first step on the journey, and if you can also ensure that your devices are trusted and behaving then you’re on the right path and Single Sign On solutions move the game on further still.

With access,