The Challenge: In the Cloud, Microsoft defines modern security perimeters extending outside your network. The Solution: User and device identity, where companies have identity-driven signals incorporated as part of their access control. Conditional Access combines...
Harry Boyne
Technical Assistance with Cyber Essentials, Cyber Essentials Plus and ISO 27001
The Challenge: How do you keep your company’s “cyber hygiene” healthy? The UK Government’s Department for Digital, Culture, Media & Sport's Cyber Security Breaches Survey 2021 confirmed the awareness of Cyber Essentials among businesses stood at 14% with...
SIEM, Email & Microsoft 365 monitoring
The Challenge Evolving threats across your network? How do you detect abnormal behaviour? Start of a potential cyber-attack? How are you notified about security events to prevent cyber breaches? The Solution Technopedia defines Security Information and Event...
A day in the life of an Office Administrator
Hi! I'm Becca, Office Administrator. I head up the logistics here at Chalkline. My role consists of working closely with the Sales and Account Management team to ensure our clients have the very best products. I'm responsible for handling the client’s hardware...
LAN Zero Trust Network Access (ZTNA)
The Challenge: Your Local Area Network (LAN) is subject to attacks; how do you protect it? In The State of Zero Trust Security 2021, 78% of companies worldwide have increased zero trust as a priority, with up to 90% working on zero trust initiatives. With emerging...
Internal IT Policy Templates
The Challenge: With every department having different IT priorities, how do you design an Internal IT policy? Chalkline recommends you review our previous articles on the importance of an Internal IT policy: Remote working: The importance of cybersecurity recommends...
DNS & Web Filtering
The Challenge: The internet is full of Malware, Phishing, Viruses, Ransomware and other malicious content. The Solution: Web Filtering is content control software restricting suspicious URLs on websites users visit. Using Web Filtering to block web threats, you can...
Managed Phishing Tests & User education portal
The Challenge: In The Explosive Increase in Ransomware Attacks, Chalkline said Cyber Crime works on a ‘campaign’ level, beginning in almost all cases with a phishing email set to trick the victim into clicking a malicious link or file. Ransomware uploads into the...
Password Manager with SSO and BreachWatch
The Challenge: Passwords are currency for Cyber criminals. They are used in credential stuffing attacks, where they automatically place users’ credentials, a series of stolen usernames and passwords into login forms on websites in order to access the users’...