Protecting NHS mobile devices from cyber attacks Jul 28, 2023 v Find out how Trustmarque secured a network of clinical mobile devices, to deter cyber criminals and protect the NHS. Background This client is a ... Microsoft Cyber Security Case Studies Read article
Securing operational technology Jul 27, 2023 Author: Alon Josefsberg, Trustmarque cyber security pre-sales consultant Protecting critical infrastructure in the digital age Operational technology ... Cyber Security Technology Blogs Read article
A guide to defending against Kerberoasting and what you can do Jul 19, 2023 Author: Jon O’Reilly, Trustmarque Senior Penetration Tester This is part two of our Kerberoasting cyber security IT blog. In part one we discussed ... Cyber Security Technology Blogs Read article
Vulnerability assessments versus penetration testing Jul 18, 2023 Author: Rob Brown, Trustmarque Senior Penetration Tester The risks of choosing vulnerability assessments over penetration testing and the value of ... Cyber Security Technology Blogs Read article
Understanding Kerberos and cyber security Jul 18, 2023 Author: Jon O’Reilly, Trustmarque Senior Penetration Tester In the world of cyber security, network authentication plays a vital role in safeguarding ... Cyber Security Technology Blogs Read article
Secure Access Service Edge (SASE) Jul 17, 2023 Author: Alon Josefsberg, Trustmarque cyber security pre-sales consultant Empowering your strategy with Secure Access Service Edge (SASE) Hybrid ... Cyber Security Technology Blogs Read article
What is Ransomware protection? Jul 17, 2023 Author: Alon Josefsberg, Trustmarque cyber security pre-sales consultant The effects of a ransomware attack, like any other cyber attack, can be ... Cyber Security Technology Blogs Read article
Trustmarque awarded Microsoft Partner accreditation for Security Jan 19, 2023 Trustmarque is proud to be awarded the Microsoft designation for security to add to our collection of five Microsoft designations. These new ... Cyber Security Read article
Phishing: Stop spam emails and secure your cloud inbox Sep 8, 2022 Protect your cloud deployment with Proofpoint and block malicious activity, securing your Microsoft 365 environment against compromises. Most of us ... Cyber Security Technology Blogs Read article
Cyber security for the public sector Apr 6, 2022 In a time when the impact of the Covid-19 pandemic is still being felt, resources are being stretched thinly. Unfortunately, cybercriminals continue ... Cyber Security Technology Blogs Case Studies Read article
Case study: University of Winchester stays on point with their cybersecurity Nov 11, 2021 The Challenge Since the pandemic, universities have faced ongoing attacks from cybercriminals who mistakenly see these institutions as ‘a soft ... Cyber Security Case Studies Read article