INFORMATION SECURITY

  • implementing best practices within organisations
  • securing devices and cloud services to minimise risk
  • deploying technical solutions to mitigate malware and intrusion threats
  • controlling cloud service access to mitigate information leakage
  • encrypting devices to protect business data in case of theft or loss
  • educating users to recognise phishing and other social engineering techniques