

Reasons to Use a Password Manager?
Everyone hates passwords – they’re annoying but essential as your cyber security depends on having strong, unique passwords. Cyber...


Phishing Attacks are on the Rise - Protect your Business
It only takes one compromised credential to cause a data breach. 5 ways to protect your business against cyber crime.


Cyber Insurance premiums soar
As cyber-attacks intensify the cost to insure against an IT security breach is soaring. Insurers are looking more closely at the levels...


Cybersecurity challenge #3: Manual incident response.Â
Organisations don’t have the time or resources to manually correlate data from multiple products in order to respond effectively...


Cybersecurity challenge #2: Coordinated Attacks
Cyber attacks are increasing. A synchronised approach to IT security is essential.


Cybersecurity challenge #1: Lack of threat visibility.
Point security products work in isolation, enabling threats to evade detection. We implement business wide synchronised security, which...


Why a synchronised approach to IT security essential
Why a synchronised approach to IT security is essential


IT security for mobile lifestyles
Today’s office is mobile. We take our phones and mobile devices with us wherever we go – on the bus, on the train, to the café at...


Sophos XG Architect
Conformedia's Service Manager, Cameron, has now completed and passed his Sophos XG Architect course. The Sophos Certified Architect...