Security

Help and ramblings from the Cheeky Munkey team

Security

IT Disaster Recovery Plan: What is it and why is it important?

The secure storage of data is instrumental to ensuring that a business- be it small or large- functions efficiently and effectively. As such, the implications…

read more

Security

What is an Incident Response Plan in IT?

Having the tools to respond to an IT security threat is always in a business’ best interest. A watertight IT response process as part of…

read more

Security

Penetration testing vs. Vulnerability Scanning

Keeping your business secure is a constant battle against cyber threats. That’s where penetration testing and vulnerability scanning come in – two powerful tactics to…

read more

Security

What are the different types of penetration testing?

Safeguarding your organisation’s systems and data is absolutely vital in today’s climate of increasing cyber threats. One proactive approach that should be central to your…

read more

Security

An IT security checklist to protect your business

Cyber attacks are as prevalent as ever, making a comprehensive cyber security protocol essential for businesses of all sizes. Preparation is key when it comes…

read more

Security

What is a penetration test and what are the benefits?

In the UK, more than 1.6 million businesses are victims of hacking attempts every year. Maintaining a safe and secure IT system is crucial, and…

read more

IT Support

IT security audits: What are they and why do they matter?

Most organisations utilise multiple IT assets for their daily operations, and as cybersecurity risks continue to evolve, it’s incredibly important for businesses to understand all…

read more

Cyber Attack

What is an IT security risk assessment and why is it important?

Every business in today’s modern world depends on advanced technology for day-to-day operations. Although businesses rely on IT systems more than ever, cybersecurity still gets…

read more

Security

AI: cybersecurity friend or foe?

Scott Brooks, Technical Strategist at IT solutions provider Cheeky Munkey, shares his expertise. As artificial intelligence (AI) rapidly becomes more widely used, people are questioning…

read more

Backup

What is endpoint protection?

What is endpoint security? Endpoint protection, or endpoint security, is the practice of securing endpoints (or entry points) of an end-users device from being exploited…

read more