How will a cyber attack affect you?

How will a cyber attack affect you?

If you suffer a breach do you have an idea of what steps to take?  Even if you do, do you have an idea on how long it…

Read More

Safer Internet Day 2024

In the United Kingdom, Keeping Children Safe in Education (KCSiE) guidance describes the legal safeguards required of…

Read More

How not to react to a data breach

How not to deal with a data breach

How not to deal with a data breach:  Back in October the Genetics Testing firm 23andMe suffered a data breach.  Nothing…

Read More

Securing Your Microsoft 365 Tenancy

The Imperative of Securing Your Microsoft 365 Tenancy

In the contemporary business landscape, where digital transformation is the norm, securing your Microsoft 365 tenancy…

Read More

North Korean bad guys target UK supply chains

The UK's NCSC and Republic of Korea (ROK) National Intelligence Service have released a joint statement to raise…

Read More

The UK-US Data Bridge

The UK adopted the DPF in October 2023 – known as the UK-US Data Bridge – and it enables UK companies to transfer…

Read More

The cost of a SOC

The cost of a SOC is prohibitive to most organisations.  In an ideal Cyber Security utopia every organisation would…

Read More

Securing Shropshire – Manufacturing focus

Securing Shropshire: We know from experience that Shropshire has lots of manufacturing organisations - we take a look…

Read More

HTTPS Content Inspection

HTTPS Content Inspection.  We are going to take an educated guess and assume your organisation has a (or many)…

Read More

MOVEit supply chain vulnerability ploughs on

4 months ago, I commented on Kroll's excellent and illuminating research into Cl0p ransomware and the MOVEit…

Read More

Hospitality & Cybersecurity Awareness Month #besmarterthanahacker

Hospitality is a potential goldmine for Cyber Criminals. A huge amount of sensitive guest data can be harvested with a…

Read More

Legal Sector & Cyber Security Awareness Month #besmarterthanahacker

The legal sector hold a lot of sensitive data and it is all of interest to the cyber-criminal. 

Read More