Skip to content
  • SERVICES
    • CYBERSECURITY INCIDENT RESPONSE
    • DISASTER RECOVERY as a SERVICE
    • INFORMATION SECURITY RISK ASSESSMENT
    • MANAGED IT SERVICES
    • MANAGED SECURITY SERVICES
    • OFFICE 365 MIGRATION
    • PROJECT SERVICES
  • SOLUTIONS
    • CLOUD SOLUTIONS
    • ESSENTIAL EIGHT CYBERSECURITY
    • IT GOVERNANCE, RISK & COMPLIANCE
  • CASE STUDIES
  • BLOG
  • TEAM
  • CAREERS
  • CONTACT

IT Cost Optimisation: Part 1 – Redundant Software



4 June, 2025 | Brandon Salem

Security Is Not a Checklist – A Deeper Dive



15 May, 2025 | Brandon Salem

CIPP Vulnerability Finding – A Third-Party Risk Story



17 March, 2025 | Brandon Salem

Protecting Biotech and Pharma Companies in the Age of AI: Imperatives and Risks



30 December, 2024 | Dr Irving Hofman

The Privileged Identity Crisis



23 December, 2024 | Brandon Salem

Common Cybersecurity Pitfalls and Preventative Measures



23 July, 2024 | Dr Irving Hofman

The Essential IT Guide for GxP Environments: How to Ensure GxP Compliance with Your IT Infrastructure



20 March, 2024 | Vlad Tsyrlin

Updates to ASD Essential Eight



13 December, 2023 | Tony Coe

When insurance is not the necessary evil!



25 September, 2023 | Vlad Tsyrlin

Strengthening Your Defence Against Social Engineering: Beyond Traditional Email Security



5 September, 2023 | Brandon Salem
  • 1
  • 2
  • 3
  • …
  • 5
  • Next »

CONNECT
WITH US

CONTACT
IS814198-mark-of-trust-certified-ISOIEC-27001-information-security-management-white-logo-trans-En-GB-1019_180x104

© 2025 Exigence

linkedin
Exigence