White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.


Mitigating the Top Security Risks Facing Organisations in the Cloud The last few years have presented hackers with an even bigger opportunity. The cloud. The move from server-based to service-based thinking is changing the way traditional IT departments design and deliver the technology that supports their businesses. Internet-accessed systems, software and applications have become massively […]

Datto’s State of the Channel – Ransomware Report EUROPE

ABOUT THIS REPORT With survey findings gathered from 150 Managed Service Providers (MSPs) serving nearly 1.1M small-to-mid-sized businesses (SMBs) across Europe, Datto’s State of the Channel Ransomware Report provides unique visibility into the state of ransomware from the perspective of the European IT Channel and their clients who are dealing with these infections on a […]

Protecting against the insider threat: Preventing the accidental send

This white paper is about the sinking feeling you get when you realise you’ve sent an email to the wrong person, attached the wrong file, or uploaded the wrong document to a file sharing site. Whether they admit it or not, the majority of people will have experienced this head in hands moment at some […]

Where ZoneFox Can Support Your Security Ecosystem

Robust information security is not delivered by a single product or vendor-provided technology. It is established through a combination of technical solutions, a clearly defined process, and employee awareness and training – all working together to provide defence against the full spectrum of threats, from advanced malware to social engineering attacks. In information security, one size does not […]

The Path to Rapid GDPR Compliance – Be Ready. Be Certain

Introduction Coming into effect in May 2018, the General Data Protection Regulation (GDPR) will bring into force the biggest changes in data protection rules in two decades. It will overhaul how businesses process and handle data. It will also financially penalize organizations that are based in or operate from the European Union, or process personal data […]


WHY CLOUD APPLICATION SECURITY CONTROLLERS WILL RULE THE WORLD If we’re being entirely honest, ‘Cloud’ and ‘Security’ are far from a natural marriage, in fact, on the surface, it’s a partnership that shouldn’t work. Cloud is seen as creative, open, progressive and inherently sociable. It’s attractive to many and has a promising future to offer […]

Secarma: ‘IoT’ Checklist

In the race to adopt the latest gadgets, online security often gets overlooked. So we’ve created a 5-point IoT cybersecurity checklist. The Internet of Things (‘IoT’, as we’re sure you know it) has amazing potential for your business. It’s all about collecting, sharing and interacting with data in innovative ways. Data is increasingly being referred […]

How to Build a SOC with Limited Resources

Your guide to detecting and responding to threats fast—even if you don’t have a 24×7 SOC. Some organisations have formal security operations centres (SOCs). Formal 24×7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock, every day of the year.

Security SOS Week

Are you wondering if ransomware really is the worst sort of malware ever? Or are you simply just struggling to get your head around GDPR? Perhaps you’re worried about how quickly phishing is evolving and becoming even more troublesome? Now you can stay up to speed on all of these topics without ever leaving your […]