The most common route into an SME network is not a sophisticated attack — it is a firewall setting that was wrong from the start, or that drifted over time. Nicholas Broderick explains how benchmarking against CIS standards turns assumption into accountability.
Cyber Security
What Your People Don’t Know: How a Structured Human Firewall Pilot Changes the Conversation
Most organisations assume their people know how to handle a phishing email. A structured Human Firewall trial reveals what they actually know — and gives management a concrete, measurable baseline to act on.
When Your Hosting Provider Gets Hacked: The DNS Security Risk Most Businesses Never See Coming
A travel consultancy contacted Si Futures because they could not send or receive email — not because of anything they had done wrong, but because their hosting provider had been compromised. This is the DNS security risk most businesses never think about: the infrastructure you rely on sits in someone else’s hands, and their security posture becomes yours by default
Before the Contract: How Trust in IT Is Actually Built
A Johannesburg financial services business experienced a security incident. Si Futures offered a security assessment rather than a sales pitch — and spent ten months earning the contract. Here is why the consultative approach is the only one we know.
When a Client Asks You to Register 250 Domains, the Right Answer Is Not Always Yes
A major investment management firm asked Si Futures to register 250 domains. We arranged a specialist meeting instead. Here’s what genuine brand protection looks like — and why homoglyph attacks are the threat most businesses haven’t considered.
Cyber Essentials Is No Longer Optional: What UK SMEs Need to Know Before April 27
The UK Cyber Essentials scheme gets significantly stricter on April 27. Si Futures examines what the changes mean for UK SMEs, why certification is increasingly the price of entry in the UK market, and what businesses need to do before the deadline.
Telling You Before It Breaks: What Proactive IT Management Really Looks Like
An expired SSL certificate on a Friday afternoon shouldn’t be a surprise. Automated monitoring with tiered 30/14/7 day notification thresholds replaced manual tracking, while REST API integration opened firewall policy hygiene analysis — identifying dead rules that create unnecessary security gaps across client estates.
Why We Fix the Problem, Not the Alert: Root Cause Resolution
Why We Fix the Problem, Not the Alert: Root Cause Resolution Infrastructure Telemetry • Alert...
Enterprise Security Deployment: Navigating Multi-Vendor Environments
600 endpoints requiring VPN compliance verification across CrowdStrike, Cisco ISE and Fortinet security fabric • Business impact: circular dependencies risked stranding distributed workforce → Architectural analysis resolved integration, 455 endpoints secured with compliance-controlled access
