In the News

Cathay Pacific hit by worst ever airline data breach

[fa icon="calendar'] Nov 9, 2018 11:30:00 AM / by Julie Lhanang posted in Cyber Risk as a Human Risk, security awareness training, Data Protection

This latest incident in the Airline industry highlights again the weaknesses in the current security setup and response plans of major companies.  Stephen Burke comments on the nature of the exposures we are seeing in these companies and highlights the need for better security protocols to be followed and more awareness and training for staff.

Read More [fa icon="long-arrow-right"]

2018 Irish Companies to Watch from Enterprise Ireland in Australia

[fa icon="calendar'] Jan 11, 2018 9:34:40 AM / by Stephen Burke posted in security awareness training, Phishing Simulation, Data Protection

We are delighted to have made the Ones to Watch list for 2018 from Enterprise Ireland in Australia. Thank you to our customers and Partners for helping get us there.

Read More [fa icon="long-arrow-right"]

Why online shoppers need to stay security-savvy.

[fa icon="calendar'] Dec 14, 2017 11:00:00 AM / by Stephen Burke posted in security awareness training, Data Protection

Cybercrime is on the rise, driven by cybercriminals who have effectively commercialised their operations, says Stephen Burke, chief executive at Cyber Risk Aware, a provider of cybersecurity awareness training.

Read More [fa icon="long-arrow-right"]

The role of education in fighting security breaches [Q&A]

[fa icon="calendar'] Dec 12, 2017 9:25:26 AM / by Stephen Burke posted in security awareness training, Data Protection

Stephen Burke in conversation with Ian Barker of Betanews on the role of education in fighting security breaches. Read the complete article here

Read More [fa icon="long-arrow-right"]

Creating a Human Firewall

[fa icon="calendar'] Nov 13, 2017 9:35:49 PM / by Stephen Burke posted in Security awareness, security awareness training, Data Protection

An organization’s cybersecurity can only ever be as strong as its weakest link and the biggest vulnerabilities of a system are not necessarily found within the hardware or software.

Read More [fa icon="long-arrow-right"]