Cyber Security, MFA The Rise and Fall of Traditional Multi-Factor Authentication (MFA) and How to Protect Against Account Compromise As organisations move more data and services to the cloud, inherently new risks present themselves. MFA for example, ...
Cyber Security Unlocking Zero Trust: Enhancing Your Secret Handshake In the world of cyber security, the concept of Zero Trust has been buzzing for years. It’s not just about firewa...
Cyber Security How to stay ahead of the cyber threat and improve your return on investment (ROI) In today's dynamic threat environment, businesses face formidable cyber security challenges that demand specialised e...
Cyber Security, GRC My journey with OneTrust Training FSP is a tool-agnostic company and encourages all consultants to both research and stay on top of the latest developm...
Cyber Security, Microsoft Exploring Microsoft Sentinel In a world where cyber threats pose a relentless and significant risk to both businesses and individuals, Microsoft S...
Cyber Security, Identity The Future of Passwordless Authentication As the world becomes increasingly digital, the threat of cyber-attacks has become a harsh reality for businesses of a...
Cyber Security, Leadership Mastering Cyber Security Preparedness for Modern Threats FSP's Cyber Incident Readiness Exercise tests an organisation’s Incident Response Plan in relation to a potential ...
Change, Training Great Training Design: The Tell-Show-Do-Apply Model Training and development are integral components of fostering growth and success within an organisation. It is essent...
Change, Training Learner-Centred Training: Where Your Growth Takes Centre Stage Have you ever been to a training session that felt more like a monologue from the trainer? We bet it doesn’t featur...