Security

Help and ramblings from the Cheeky Munkey team

Security

AI: cybersecurity friend or foe?

Scott Brooks, Technical Strategist at IT solutions provider Cheeky Munkey, shares his expertise. As artificial intelligence (AI) rapidly becomes more widely used, people are questioning…

read more

Backup

What is endpoint protection?

What is endpoint security? Endpoint protection, or endpoint security, is the practice of securing endpoints (or entry points) of an end-users device from being exploited…

read more

Security

The top 10 cybersecurity threats

Cybersecurity threats have been on the rise over the past few years – evolving in vector and complexity. Changes in business landscapes, including remote working…

read more

Security

Passwordless Access

You must phase out passwords. 20% of security breaches, according to IBM, are the result of compromised credentials. Without a question, the market is indicating…

read more

Cyber Attack

Protect your organisation from Malware

Did you know there are over 1 billion malware viruses infecting workstations and networks globally? It is no wonder that so many cyberattacks occur every…

read more

Cyber Attack

Cybersecurity Mythbusting

Did you know that 63% of UK CEOs are concerned about how cyber threats could harm their ability to sell good and services? – PwC….

read more

Cyber Attack

FAQ’s for SMB Cybersecurity

In this blog we will answer some of the FAQ’s related to SMB cybersecurity. In the past couple of years hybrid working has taken over….

read more

Cyber Attack

How Employees can reduce cybersecurity risk

Businesses across all industries are constantly at risk of falling victim to a cyberattack. In order to reduce this risk, it is essential that businesses…

read more

Cyber Attack

The role passwords play in a world of cybercrime

For businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are…

read more

Cyber Attack

Ukrainian Malware Attacks: Fake Ransomware Explained

On January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware attacks within the Ukraine. The Ukraine government has evidence that a…

read more