Blog

The Internet is Broken

This month we are sharing a blog from our partner Netskope.

You’ve probably heard at one point or another the cliché that the internet is broken. It’s no secret that the underlying infrastructure that businesses around the world use to access cloud applications and data is flawed and wasn’t built with today’s scale in mind.

more →

Blog

Data Breach costs are increasing – what’s the impact of COVID?

Data breaches have far-reaching consequences, causing financial losses and long-lasting reputational damage. Despite increasing worldwide spending on IT security products and services, breaches and malicious attacks continue to grow.  As organizations try to recover from effects of the COVID-19 pandemic, these breaches are dramatically impacting the bottom line.

A recent report published by IBM Security, Cost of A Data Breach Report 2020, revealed that worldwide, the cost of a data breach is going up.

more →

Blog

NCSC Guidance On Preparing For A Denial Of Service Attack

Alastair Horner

Distributed Denial of Service or DDoS is an attack where there is an attempt to render an online service unavailable by overwhelming it with traffic from multiple distributed sources.

The National Cyber Security Centre (NCSC) is a pivotal organization in cyber security advice and supports the most critical organizations in the UK, the wider public sector, industry, SMEs and the general public.

more →

Blog

CrowdStrike’s Adam Meyers on eCrime Actors’ Pivot to Ransomware

Sharon Holland

A recent article on Dark Reading by VP of Intelligence Adam Meyers at our partner Crowdstrike is titled “The Big E-Crime Pivot.” It puts forth the argument that cybercriminals “have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.”

For those that don’t have time to read the full article, we have collated some of the highlights:

What is the Pivot?

more →

Blog

What Should a Cyber Incident Playbook Include?

Alastair Horner

Do You Really Need A Cyber Incident Playbook?

As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different?  Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.

more →

Blog

Taking Care of The Little Things

Andy Powell

Resilient Firewalls, DDoS Mitigation, Multi-factor Authentication are the sexy parts of IT but can be easily brought down if the small things are ignored. By ‘small’ things I really mean the more mundane tasks linked to good IT security;

  • Anti-Virus
  • Admin Rights 
  • Patching
  • SSL Certificates
  • Testing

Anti-Virus

If your AV is not up-to-date and a network user accidentally clicks on a
link, opens an attachment or falls for a phishing scam, it could result in
a destructive virus spreading around the network, locking users out of
important data or destroying the data. 

more →