Blog

Data Breach costs are increasing – what’s the impact of COVID?

Data breaches have far-reaching consequences, causing financial losses and long-lasting reputational damage. Despite increasing worldwide spending on IT security products and services, breaches and malicious attacks continue to grow.  As organizations try to recover from effects of the COVID-19 pandemic, these breaches are dramatically impacting the bottom line.

A recent report published by IBM Security, Cost of A Data Breach Report 2020, revealed that worldwide, the cost of a data breach is going up.

more →

Blog

Grey outlook for cloud security

Sharon Holland

Gartner’s latest report, Managing Privileged Access in Cloud Infrastructure, estimates that within the next 3 years, three-quarters of security incidents in the cloud will involve mismanagement of identities, access and privilege.  This equates to a 50% increase and will make it the number one reason for cloud security failures.

As businesses move more and more data and services to the cloud, protecting cloud infrastructure is vital.

more →

Blog

Don’t be the next Travelex!

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →

Blog

What Should a Cyber Incident Playbook Include?

Alastair Horner

Do You Really Need A Cyber Incident Playbook?

As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different?  Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.

more →

Blog

Penetration Testing vs DDoS Testing

We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers.  However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough.  This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.

more →