Evidence-Based Security Practices

Expansive compliance frameworks listing hundreds of security measures can be found in may places, from the likes of NIST, ISO and CIS.  While great for defining what “good” looks like – which controls give you the most risk

Decoding Cloud Security and Pentests for SME CEOs

In today’s digital landscape, where businesses increasingly rely on cloud services, ensuring the security of your data and systems is paramount. As the CEO of a small to medium-sized enterprise (SME), you understand the importance of safeguarding your company’s assets against cyber threats.

Unlocking the Power of MFA

Let’s face it, dealing with Multi-Factor Authentication (MFA) can sometimes feel like an inconvenience. But before you dismiss it as a hassle, consider this:

How to stay ahead of Cybercriminals

Welcome to the wild world of emails—a playground where cybercriminals roam freely, preying on unsuspecting victims with cunning tactics that would make even the sneakiest of spies jealous. These digital deviants have turned email into their personal hunting ground, casting their malicious nets far and wide to ensnare the unwary.

Would a SOC work for my business?

It’s like having a superhero team of security analysts, engineers, and experts working together to shield you from cyber threats.

AI Instant Response

In the evolving landscape of cybersecurity, time is of the essence. At FoxTech, we understand this urgency and have realtime response through Defend’s Instant Response feature.

Ransomware Red Flags

Ransomware attacks are a growing concern for businesses of all sizes, but especially for mid-sized companies that may not have the extensive resources of larger corporations.

Zero-Day Attack Prevention & Cure

A zero-day attack is a type of cyber attack that targets previously unknown vulnerabilities or weaknesses in software, hardware or systems.

Risk and Security Management

Risk And Security Management Ever found yourself blindsided by a vulnerability you never knew existed? Picture this: worn-out brake pads lead to a sudden failure at an intersection, propelling you into oncoming traffic. Often in risk impact analysis, we underestimate the cost of a solution compared to the risk itself, opting to do nothing and […]

What are my SOC Options?

Running a Security Operations Center (SOC) can be a significant investment for any organisation. While the benefits of having a SOC are clear, it’s important to weigh the costs and benefits of running a SOC in-house versus outsourcing to a third-party provider.