The Very Best In InfoSec Education

Information Security is Not Optional

Our team of experienced experts provide educational content focused on helping technology users of all levels learn a wide range of cyber and information security topics…

Our Latest Articles

Accelerate Security Adoption

Technology and the way it shapes the world around us is changing at an incredible pace. It can be a real challenge just keeping up with all of the new laws, regulations, and compliance requirements let alone implement an effective security strategy. We understand the struggles and resistance when rolling out anything new. has put together a suite of solutions that help your organization accelerate the adoption of information security.

Frequently Asked Questions

What is information security?

Information is an asset to all individuals and businesses. Information Security, in general, refers to the protection of these assets in order to achieve Confidentiality, Integrity and Availability.

  • Confidentiality: protecting information from being disclosed to unauthorized parties.
  • Integrity: protecting information from being changed by unauthorized parties.
  • Availability: to the availability of information to authorized parties only when requested.
What about information security management?

Information security management involves a combination of prevention, detection and reaction processes. It is a cycle of iterative activities and processes that require ongoing monitoring and control. The cycle includes the following:

  • Assessing security risk: performing security risk assessment to identify threats, vulnerabilities and impacts
  • Implementing & maintaining a secure framework: defining and developing policies, assigning responsibilities and applying safeguard measures
  • Monitoring & recording: monitoring and recording constantly so that proper arrangements can be made when tackling a security incident
  • Reviewing & improving: conducting periodic review and security audit to make sure that adequate security controls are meeting security requirements
Is Awareness Training Affordable?

Our partner’s premium awareness training is at a price-point that won’t break the bank. Check out their pricing here.

Who should perform a security audit?

A security audit is a complex task requiring skilled and experienced personnel; it must be planned carefully. To perform the audit an independent and trusted third party is recommended. This third party can be another group of in-house staff or an external audit team, dependent on the skills of the internal staff and the criticality/sensitivity of the information being audited.

Why Information Security Training is Important…

Data breaches and cyber crimes are everywhere and very expensive. It can happen to anyone- whether you’re just a small start-up or international organization.




Subscribe to Our Newsletter

We send out new articles every week. They'll help keep you informed about important information security topics and news.