Navigating the cyber security marketplace

January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Spotlight

FireEye

FireEye is transforming the cyber security landscape to combat today's advanced cyber attacks, and we want you to be part of our team. FireEye and its unique approach to security has been featured in The Wall Street Journal, Fox News, BusinessWeek, Bloomberg TV, and other mainstream media. A leader in advanced technology, FireEye has received the Wall Street Journal Technology Innovation Award as well as the JPMorgan Chase Hall of Innovation Award. FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks.

Other Infographics
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More
news image

Cyber Security Checklist for 2019

Infographic | December 3, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more important.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More
news image

Cybersecurity in Retail Infographic

Infographic | February 15, 2020

77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer.

Read More
news image

Alarming Cyber Security Stats to Know in 2022

Infographic | June 29, 2022

Attackers use multiple tactics to get access to your credentials and among those phishing is the most commonly used method. Every 9 out of 10 cyber-attacks start with a phishing email and end up costing millions of dollars to the organizations.

Read More

Spotlight

FireEye

FireEye is transforming the cyber security landscape to combat today's advanced cyber attacks, and we want you to be part of our team. FireEye and its unique approach to security has been featured in The Wall Street Journal, Fox News, BusinessWeek, Bloomberg TV, and other mainstream media. A leader in advanced technology, FireEye has received the Wall Street Journal Technology Innovation Award as well as the JPMorgan Chase Hall of Innovation Award. FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks.

Events