Every day is Data Protection Day. How can you protect your data from attack?

Every day is Data Protection Day. How can you protect your data from attack?

Data protection is one of the central pillars of cybersecurity, everything we do in the profession is to protect data before it is attacked. So for us, every day is Data Protection Day. For many organisations, data protection feels like a daunting task. It requires investment of both time and resources, and it never ends.…

Read more
Never Trust, Always Verify: The Benefits of Zero Trust Security Model

Never Trust, Always Verify: The Benefits of Zero Trust Security Model

Zero trust is one of the most celebrated concepts in cybersecurity right now. The basic tenet of zero trust architecture is – trust nothing, always authenticate in order to protect the network. We explore what is a zero trust security model, the benefits of adopting it, and how to implement a zero trust architecture in…

Read more
Take Your SSDLC Forward With STRIDE Threat Modelling

STRIDE Threat Modelling: Six Steps to a Secure Application

Today’s cyber attackers are becoming ever more inventive in the way they achieve big bang cyber attacks, using tactics such as hacking suppliers in order to gain access to their customers, or compromising vulnerabilities inside an application’s code in order to attack an organisation.  As a result, developers need to be more threat conscious than…

Read more
Staying Safe: 9 Cybersecurity Tips for Startups

Stay Safe and Protected: 9 Cybersecurity Tips for Startups

As startups and small businesses know well, small doesn’t mean insignificant. Size doesn’t matter when you are intent on making an impact on your field. Growth is the name of the game, and you will do everything you can to maintain an upwards trajectory. Including looking for cybersecurity tips for startups, because you know that…

Read more
What are the biggest cybersecurity threats facing businesses?

What are the biggest cybersecurity threats facing businesses?

Cybersecurity is a living thing, constantly moving in new directions. The size and scope of attacks grow, the biggest cybersecurity threats change (although previous biggest cybersecurity threats rarely disappear), and the methods of attack evolve. That’s why it is important for organisations of all shapes and sizes to stay on top of current cybersecurity threats.…

Read more
Cybersecurity in FinTech: 7 Best Practices to Stay Safe

Cybersecurity in FinTech is Key to Building a Safe, Successful Product

As with all technology, the Covid-19 pandemic has created both opportunities and challenges for the FinTech industry. User take up of FinTech products increased as users became more accustomed to doing things remotely and contactlessly. And cyber criminals took the opportunity to release a flood of ever more sophisticated attacks on users and companies alike.…

Read more
Is cyber liability insurance coverage worth the cost?

Is cyber liability insurance coverage worth the cost?

As the risk of cyber attack increases, and the cost of those attacks rises, many organisations of all sizes and across all sectors and industries have invested in cyber liability insurance coverage to mitigate the impact of a cyber attack when it occurs. As of now, 43% of businesses and 29% of charities in the…

Read more
Measuring success: 15 Cybersecurity Performance Metrics

Measuring success: 14 Cybersecurity Performance Metrics That Count

Cybersecurity never sits still. While you may have created a programme that addresses the current cyber threats towards your organisation, the chances are that it will not stay that way. New threats emerge, new techniques and technologies are put into play by cyber criminals, and employees change. You can’t manage what you don’t know, and…

Read more
Is it legal to pay ransomware demands?

Is it legal to pay ransomware demands?

Ransomware attacks are increasing in frequency, scope, and severity. Ransomware demands are also getting higher, and desperate companies are paying up in order to try to get to normal as quickly as possible.  The official stance from governments and law enforcement agencies has always been that companies shouldn’t pay the ransomware demand, but that doesn’t…

Read more
A Guide to Cyber Security Incident Response Planning

A Guide to Cyber Security Incident Response Planning

In 2020, 39% of businesses in the UK reported a cyber security breach or attack. When an attack takes place, it kicks off a cyber security incident response effort aimed at mitigating the impact of the event, limiting the damage to the organisation’s operations, finances, and reputation. However a successful cyber attack incident response begins…

Read more
Kaseya Ransomware Attack Update: What You Need To Know

Kaseya Ransomware Attack Update: What You Need To Know

The cyber security world was rattled last week with the revelation of the largest ever ransomware attack – the Kaseya ransomware attack. A complicated mix of zero-day, supply chain, and ransomware attacks, the Kaseya ransomware attack was a sophisticated ransomware attack which compromised the on-premises version of the Kaseya VSA, a tool used by Managed…

Read more