Blog

Bring Your Own Device – ELearning Course

Posted on
bring your own device

Now that many more people are working from home, it is likely that more personal devices are introduced to your organisation’s network. It is important to consider cyber security from this perspective and reduce the risk of cyber attack to your network.     When employees are using their own devices on your organisation’s network, it […]

USecure

Anti-Tax Evasion

Posted on
anti tax evasion

An Anti-Tax Evasion policy is a good way to demonstrate your organisation’s commitment to honest and ethical business practices.  The Criminal Finances Act 2017 refers to Tax Evasion and this is a good source of information to ensure you are always on the right side of the law.  Your organisation’s Anti-Tax evasion policy should state […]

Blog

Anti-Slavery

Posted on
anti slavery

The Modern Slavery Act 2015 states that servitude, forced or compulsory labour, regardless of the age of the person, across a broad range of types of work and service and even if consent is given, could be considered as slavery.   Employment law aims to protect all workers, and a good knowledge of this will help […]

Blog

Anti Money Laundering

Posted on
Anti Money Laundering

Money laundering is a term used to describe money made from criminal activity being passed through apparently legitimate bank accounts and transactions to hide the origins.  This is often achieved by making commercial transactions or bank transfers using a number of different accounts to make it more difficult to track. This is of course illegal, […]

USecure

Human Risk Factor

Posted on

The Human Risk Factor Reporting tool from uSecure tests how long it would take for your organisation’s cyber security measures to be breached, then compiles a handy report identifying: How long it would take to breach your cyber security measures How it could be breached and where the vulnerabilities are Suggestions to improve you cyber […]

Blog

Anti-Bribery

Posted on
Anti Bribery

The Anti Bribery Act 2010, which was amended in 2011, sets out the need to guard against bribery practices in the workplace.  Most organisations will have an anti-bribery policy which highlights the responsibilities within the organisation for preventing corruption and reporting anything suspicious. It is important to make sure you have read your organisation’s policy […]

Blog

10 steps to secure your home network

Posted on
home network

Many more people are working from home since the COVID pandemic of 2020, and it is likely that many people will continue to do so.  It has, for the majority of people, turned out to be a more cost effective and convenient way of structuring the working week. However, this brings some additional cyber security […]

USecure

uPolicy

Posted on

Simplify policy management and ensure user acknowledgement. Manually updating users on policy updates and chasing signatures is a time consuming, outdated and ineffective approach. uPolicy simplifies policy communications and user acknowledgement by automating the process – sending policy changes directly to your users’ inbox and tracking who has opened and signed their document. Part of […]

USecure

uPhish

Posted on

uPhish automates regular phishing assessments alongside your users’ training programme, determining user risk towards common attacks while ensuring training effectiveness. Your automated feature, AutoPhish, periodically deploys a range of common phishing attacks, tracking real-time compromised rates and highlighting key trends. (Note – simulations can be automated or deployed manually) Part of the uSecure Platform This […]

Cyber Security

uLearn

Posted on

uLearn enables your organisation to easily deploy continuous security awareness training in the most time-efficient and cost-effective way. Packed with engaging training content, uLearn crafts user-tailored programmes and eliminates repetitive admin tasks through automation – reducing insider threats, data breaches and ransomware, while meeting the demands of compliance standards such as GDPR and PCI. Users […]