It Takes 5 Steps To A Cyber Incident Response Plan

The worst has happened and you’ve discovered that your organisation has been hacked. So what should you do next? TheCyber Security Breaches Survey2017, endorsed by the UK ...
Read More

Cyber Essentials for Law Firms - Understanding Insider Threats

Cybersecurity attacks are so commonplace that incidents regularly make front page news. They don’t discriminate either; cybercriminals target any sized company from every sector. ...
Read More

Top 5 Reason You Need Visibility Around Data Flow

Data is the lifeblood of most organisations. Odd, then, that many CIOs and CISOs can't explain how data moves in and out of their company, or how it flows through their networks. ...
Read More

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organisations should regard all network traffic as untrusted, regardless of where it’s coming from. ...
Read More

What is Digital Transformation?

Digital transformation is more than just a buzzword - it's a process of using technology to radically change your business. Look beyond the hype and you'll find a daunting ...
Read More

A Brief History of Hacking

Cybercrime is a blight on the modern world, but you may be surprised to discover that it’s nothing new. In fact, ever since people first invented communications technology there ...
Read More

Halfway Through 2018, is This the Year of the Insider Threat?

The likes of Yahoo! made 2016 the year of the data breach; in 2017 WannaCry and its effect on the NHS ensured that ransomware was on everyone's lips. When it comes to ...
Read More

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service. A newly discovered vulnerability in Microsoft's ...
Read More

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More