Security
Help and ramblings from the Cheeky Munkey team
Backup
What is endpoint protection?What is endpoint security? Endpoint protection, or endpoint security, is the practice of securing endpoints (or entry points) of an end-users device from being exploited…
read moreSecurity
The top 10 cybersecurity threatsCybersecurity threats have been on the rise over the past few years – evolving in vector and complexity. Changes in business landscapes, including remote working…
read moreSecurity
Passwordless AccessYou must phase out passwords. 20% of security breaches, according to IBM, are the result of compromised credentials. Without a question, the market is indicating…
read moreCyber Attack
Protect your organisation from MalwareDid you know there are over 1 billion malware viruses infecting workstations and networks globally? It is no wonder that so many cyberattacks occur every…
read moreCyber Attack
Cybersecurity MythbustingDid you know that 63% of UK CEOs are concerned about how cyber threats could harm their ability to sell good and services? – PwC….
read moreCyber Attack
FAQ’s for SMB CybersecurityIn this blog we will answer some of the FAQ’s related to SMB cybersecurity. In the past couple of years hybrid working has taken over….
read moreCyber Attack
How Employees can reduce cybersecurity riskBusinesses across all industries are constantly at risk of falling victim to a cyberattack. In order to reduce this risk, it is essential that businesses…
read moreCyber Attack
The role passwords play in a world of cybercrimeFor businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are…
read moreCyber Attack
Ukrainian Malware Attacks: Fake Ransomware ExplainedOn January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware attacks within the Ukraine. The Ukraine government has evidence that a…
read moreIT Support
Hybrid Working: What’s Next for Hybrid Work in 2022A recent study found that hybrid work models are used by 63% of high-growth companies and are the preferred model for 83% of their employees….
read more