Michelle Davidson
Recent Posts
-
A Guide to the White House’s National Cybersecurity Strategy
March 09, 2023We explore the five pillars which make up the National Cybersecurity Strategy from the White House,…
-
How to Prevent a Data Breach With Cloud-Based Managed PKI
January 18, 2023In this article, we'll take a look at how utilizing cloud-based managed PKI can help prevent costly…
-
4 ISO Standards to Look Out For When Choosing a CA
January 10, 2023In this article, we’ll look at four ISO Standards and how they can guarantee a CA has implemented…
-
A Guide to Cybersecurity Compliance Across Industries
December 13, 2022As the cybersecurity landscape evolves, so do the compliance requirements for businesses across…
-
Password Security – Take Your Organization to the Next Level
December 06, 2022How strong is your organization’s password security and what can you do to take it to the next…
-
7 Cybersecurity Predictions and Trends for 2023
December 01, 2022Over the last few years, with the advances in technology, conversations around cybersecurity have…
-
IoT Connected Devices to Become More Resilient Against Cybercrime
November 30, 2022Through new standards and proposed legislation we will see connected devices become more secure and…
-
How to Ensure Password Hygiene at Your Organization
November 22, 2022What is password hygiene and how can you maintain it within your organization to protect company…
-
Why Enterprises Should Use Certificate-based Authentication as Access Control
November 15, 2022Let’s look at certificate-based authentication and how it can it take multi-factor authentication…
-
What is Multi-factor Authentication (MFA) and How Can it Protect Your Company Assets?
November 08, 2022What is Multi-factor Authentication and how can it help control which endpoints can access your…
-
9 Ways to Protect Your Organization Against Ransomware Attacks
October 20, 2022Ransomware is currently the top type cybersecurity attack on organizations, but what is it and how…
-
11 Tips on Spotting Malicious Emails
October 18, 2022Phishing continues to be a threat to enterprises and just the starting point for cyberattack, here…
-
What Are The Common Types of Email Phishing Attacks?
October 13, 2022What are the four most common types of email phishing attacks that could occur to your business and…
-
How to Identify and Avoid Phishing Attacks (Infographic)
October 06, 2022What are the red flags to look out for in a phishing attempt? We explore this and more with an…
-
GlobalSign win a Frost & Sullivan Best Practice Award
September 20, 2022We are proud to announce GlobalSign have won the Frost & Sullivan Best Practice 2022 Global…