
Reasons to Use a Password Manager?
Everyone hates passwords – they’re annoying but essential as your cyber security depends on having strong, unique passwords. Cyber...

Phishing Attacks are on the Rise - Protect your Business
It only takes one compromised credential to cause a data breach. 5 ways to protect your business against cyber crime.

Cyber Insurance premiums soar
As cyber-attacks intensify the cost to insure against an IT security breach is soaring. Insurers are looking more closely at the levels...

Cybersecurity challenge #3: Manual incident response.Â
Organisations don’t have the time or resources to manually correlate data from multiple products in order to respond effectively...

Cybersecurity challenge #2: Coordinated Attacks
Cyber attacks are increasing. A synchronised approach to IT security is essential.

Cybersecurity challenge #1: Lack of threat visibility.
Point security products work in isolation, enabling threats to evade detection. We implement business wide synchronised security, which...

Why a synchronised approach to IT security essential
Why a synchronised approach to IT security is essential

IT security for mobile lifestyles
Today’s office is mobile. We take our phones and mobile devices with us wherever we go – on the bus, on the train, to the café at...

Sophos XG Architect
Conformedia's Service Manager, Cameron, has now completed and passed his Sophos XG Architect course. The Sophos Certified Architect...