Making the Most of Customer Identity – Build vs Buy and Beyond…

We’ve all had those jarring authentication experiences as customers. A web page not letting us log in properly or timing out. MFA prompt not coming through in time. Self-password reset? Reset emails never arrive. Unfortunately, they’re not rare. With a drive and focus on the importance of identity and access management within our organisations, something […]

Read More…

Log4j Vulnerability – Education and Guidance from our vCISO team

Log4j Vulnerability Explained, Guidance & Education

It’s been a busy weekend for attackers and defenders alike – security researchers have already detected a wealth of malicious activities where the bad guys have been exploiting arguably the biggest vulnerability of 2021. This has been commonly referred to at the Log4j vulnerability. It feels like we have stepped back in time to 2014 […]

Read More…

Evaluating Workforce Identity Maturity

We’ve seen in the last year and a half some amazing transformation of IT systems to enable teams to work remotely efficiently and securely because of the pandemic. Ensuring that everyone, regardless of where they are and what their role entails can have a seamless experience is far from simple. Remote onboarding is an area […]

Read More…

Backup – a Critical Pillar of Incident Response

We live and breathe security at Saepio, so it’s quite fascinating for us that most new organisations we speak to have not conducted a Cyber Risk Assessment.  The 2021 UK Gov cyber survey states only 34% of businesses have.  For those that haven’t, it’s difficult for them to know how ready they are to respond […]

Read More…

Third Party Cyber Risk Management

Cyber Score Software | Saepio

I’m glad to see that UK companies of all sizes, and across all verticals, are starting to take Cyber Security more seriously. More organisations are looking at best practice guidance, and frameworks such as Cyber Essentials, ISO27001 or the NCSC CAF. Areas common to those three standards, are to look into the technical vulnerabilities they […]

Read More…