- implementing best practices within organisations
- securing devices and cloud services to minimise risk
- deploying technical solutions to mitigate malware and intrusion threats
- controlling cloud service access to mitigate information leakage
- encrypting devices to protect business data in case of theft or loss
- educating users to recognise phishing and other social engineering techniques