Please enable JavaScript.
Coggle requires JavaScript to display documents.
Blue logic IT Security (Perimeter security vectors (Mobile (Perim security…
Blue logic IT Security
Supply chains
Supply chain attacks becoming more popular
growing need for perimeter security (or off perimeter?)
Cloud
Cloud not intrinsically secure: need a perimeter solution?
Office 365
Azure
AWS
Managed service
Average repsonse times vs competition
X tips when choosing a security provider
DC tours?
Critical failure examples
Disaster recovery
Perimeter security vectors
Email
Phishing attacks
Stats
Viruses
Internet
Cloud
Traffic firewall
Next gen firewall (NGFW)
IP Routing
Remote access - fresh opportunity for hackers?
Users - training required for secure org
Whose role is it to tackle security? (everyones!)
Phiashing attacks
Mobile
Perim security from mobile devices
MDM solutions
EMM solutuions
Our people
BIOs of executive team
Day in the life stylised videos
Case studies - going above and beyond in crisis
Why the cloud is not enough to protect your organisation
X ways to keep your data secure in the cloud
Guide to cyber security in the cloud
Case studies
How secure is your cloud - stats?