Welcome to
A place to release your cyber-stress

All CyberToon strips

Dec 22

The hidden heroes of our time

There is a group of heroes whose stories go untold, for whom songs are not sung and holidays are not dedicated. But they are pillars of our society, maintaining the stability and structure of our way of life alongside the teachers, policemen, doctors, and other guardians of good who uphold the order and improve our lives. Who are these people?

To all our cyber security professionals working around the clock to keep us safe - you have our gratitude. We carry on knowing we are protected, companies can continue to do business without succumbing to threats or fear, and we know you deserve our respect, even if sometimes it starts with just a little bit...

  

There is a group of heroes whose stories go untold, for whom songs are not sung and holidays are not dedicated. But they are pillars of our society, maintaining the stability and structure of our way of life alongside the teachers, policemen, doctors, and other guardians of good who uphold the order and improve our lives. Who are these people?

To all our cyber security professionals working around the clock to keep us safe - you have our gratitude. We carry on knowing we are protected, companies can continue to do business without succumbing to threats or fear, and we know you deserve our respect, even if sometimes it starts with just a little bit...

  
Dec 9

Vulnerability Blast From The Past

Information Technology (IT) is a lot like archeology. There are layers of legacy beneath the surface made by people that are no longer around.

The difference is that with IT, these layers of dated technology can backfire. In other words – everything in IT, whether known or not, can and will be used against you in the course of a breach. These skeletons in the IT-closet can come back to haunt you.

But no one really knows what’s down there and it’s not documented. So what’s the solution to unearth and mitigate these past subterranean breachable exposures?

Answer: Automated Penetration Testing will reveal these weaknesses in seconds, network-wide.

  

Information Technology (IT) is a lot like archeology. There are layers of legacy beneath the surface made by people that are no longer around.

The difference is that with IT, these layers of dated technology can backfire. In other words – everything in IT, whether known or not, can and will be used against you in the course of a breach. These skeletons in the IT-closet can come back to haunt you.

But no one really knows what’s down there and it’s not documented. So what’s the solution to unearth and mitigate these past subterranean breachable exposures?

Answer: Automated Penetration Testing will reveal these weaknesses in seconds, network-wide.

  
Nov 24

Your Answer to the Board Room

Cyber security budgets are always stressed, but 2020 has introduced new needs due to the accelerated digital transformation and WFH. 

Both trends increase the attack surface and the sense of urgency to boost spend on cyber security, remote gate ways, and multi-factor authentication solutions.

There is a big question mark about the ability of cyber security budgets to continue to grow relative to the IT budget and the overall business turnover. Something needs to change.

Choosing solutions with increased automation, and testing the validity and efficacy of the defenses we already have in place is the call of the hour to allow us to do more, smarter, with less.

  
Cyber Security Budget Pcysys

Cyber security budgets are always stressed, but 2020 has introduced new needs due to the accelerated digital transformation and WFH. 

Both trends increase the attack surface and the sense of urgency to boost spend on cyber security, remote gate ways, and multi-factor authentication solutions.

There is a big question mark about the ability of cyber security budgets to continue to grow relative to the IT budget and the overall business turnover. Something needs to change.

Choosing solutions with increased automation, and testing the validity and efficacy of the defenses we already have in place is the call of the hour to allow us to do more, smarter, with less.