Reduce cyber security risks by doing the basics

Anyone claiming that their cybersecurity product will make you immune to cyber threats isn’t telling the truth. Hackers and cybercriminals are constantly playing a game of cat ...
Read More

Alternative Legal IT Conference 25th-26th September 2018

The Alternative Legal IT Conference is unique, now in its 10th year it is the only Conference totally focused on how IT can support and influence the strategic development of the ...
Read More

Cyber Essentials for Law Firms - Understanding Insider Threats

Cybersecurity attacks are so commonplace that incidents regularly make front page news. They don’t discriminate either; cybercriminals target any sized company from every sector. ...
Read More

Top 5 Reason You Need Visibility Around Data Flow

Data is the lifeblood of most organisations. Odd, then, that many CIOs and CISOs can't explain how data moves in and out of their company, or how it flows through their networks. ...
Read More

How to get the most, out of your public cloud

Very few would dispute the notion that the public cloud, also known as infrastructure as a service (IaaS) platforms, have provided IT with a hugely powerful way to deploy services ...
Read More

Tip of the Week: Hackshit Phishing as a Service (PhaaS)

Last year, Netskope Threat Research Labs discovered Hackshit Phishing as a Service (PhaaS) platform that recorded the victims credentials via websocket service hosted in Amazon ...
Read More

Incomplete visibility a top security failing

Incomplete visibility of IT environments is among the most common basic enterprise security failings, as most organisations are still failing to achieve basic cyber security ...
Read More

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More

The Insider Threat, risky behaviour and the bad habits you need to grow out of

The insider threat, although very real, isn’t always what it seems. Each and every individual in an organisation has the potential to become an insider threat. Although they ...
Read More