Staying Safe: 9 Cybersecurity Tips for Startups

Stay Safe and Protected: 9 Cybersecurity Tips for Startups

As startups and small businesses know well, small doesn’t mean insignificant. Size doesn’t matter when you are intent on making an impact on your field. Growth is the name of the game, and you will do everything you can to maintain an upwards trajectory. Including looking for cybersecurity tips for startups, because you know that…

Read more
What are the biggest cybersecurity threats facing businesses?

What are the biggest cybersecurity threats facing businesses?

Cybersecurity is a living thing, constantly moving in new directions. The size and scope of attacks grow, the biggest cybersecurity threats change (although previous biggest cybersecurity threats rarely disappear), and the methods of attack evolve. That’s why it is important for organisations of all shapes and sizes to stay on top of current cybersecurity threats.…

Read more
Cybersecurity in FinTech: 7 Best Practices to Stay Safe

Cybersecurity in FinTech is Key to Building a Safe, Successful Product

As with all technology, the Covid-19 pandemic has created both opportunities and challenges for the FinTech industry. User take up of FinTech products increased as users became more accustomed to doing things remotely and contactlessly. And cyber criminals took the opportunity to release a flood of ever more sophisticated attacks on users and companies alike.…

Read more
Is cyber liability insurance coverage worth the cost?

Is cyber liability insurance coverage worth the cost?

As the risk of cyber attack increases, and the cost of those attacks rises, many organisations of all sizes and across all sectors and industries have invested in cyber liability insurance coverage to mitigate the impact of a cyber attack when it occurs. As of now, 43% of businesses and 29% of charities in the…

Read more
Measuring success: 15 Cybersecurity Performance Metrics

Measuring success: 14 Cybersecurity Performance Metrics That Count

Cybersecurity never sits still. While you may have created a programme that addresses the current cyber threats towards your organisation, the chances are that it will not stay that way. New threats emerge, new techniques and technologies are put into play by cyber criminals, and employees change. You can’t manage what you don’t know, and…

Read more
Is it legal to pay ransomware demands?

Is it legal to pay ransomware demands?

Ransomware attacks are increasing in frequency, scope, and severity. Ransomware demands are also getting higher, and desperate companies are paying up in order to try to get to normal as quickly as possible.  The official stance from governments and law enforcement agencies has always been that companies shouldn’t pay the ransomware demand, but that doesn’t…

Read more
A Guide to Cyber Security Incident Response Planning

A Guide to Cyber Security Incident Response Planning

In 2020, 39% of businesses in the UK reported a cyber security breach or attack. When an attack takes place, it kicks off a cyber security incident response effort aimed at mitigating the impact of the event, limiting the damage to the organisation’s operations, finances, and reputation. However a successful cyber attack incident response begins…

Read more
Kaseya Ransomware Attack Update: What You Need To Know

Kaseya Ransomware Attack Update: What You Need To Know

The cyber security world was rattled last week with the revelation of the largest ever ransomware attack – the Kaseya ransomware attack. A complicated mix of zero-day, supply chain, and ransomware attacks, the Kaseya ransomware attack was a sophisticated ransomware attack which compromised the on-premises version of the Kaseya VSA, a tool used by Managed…

Read more
Security Stack Mappings for Azure Research Project

Security Stack Mappings for Azure Research Project

IT security teams face a constant battle to keep on top of the security controls provided by their core suppliers. They are required to show how a move to this platform, operating system or cloud will enhance their organisation’s security, and why.  The Security Stack Mappings for Azure research project from Microsoft and MITRE-Engenuity is…

Read more
6 social engineering tactics in action in 2021 and what to do about them

6 social engineering tactics in action in 2021 and what to do about them

It’s long been acknowledged that human beings are the weakest link in any organisation’s cybersecurity. Education and training campaigns by employers, government agencies, and other professionals have raised awareness of social engineering tactics, and regularly remind users to be alert, but as with any form of cyber attack, the methods used by cyber criminals to lure…

Read more
Welcome to our new Board Member - Naor Penso

Welcome to our board team – Naor Penso

Cynance is delighted to welcome our new advisory board member Naor Penso. Naor is an exceptional cybersecurity executive leader who brings a wealth of knowledge, vision, and most importantly passion to help guide Cynance through the next stage of our growth and development. A cybersecurity veteran with over 20 years of experience, Naor is an…

Read more
Protect Your Customers With Crypto Wallets Security Testing

Protect Your Customers With Crypto Wallets Security Testing

Crypto wallets with their valuable contents are an attractive target for cyber criminals. Cyber attackers look for any opportunity to breach both hot and cold crypto wallets, and wallet users rely on their wallet providers to keep their crypto currency safe. As a result, crypto wallets implement information security controls to keep them safe, from…

Read more