Blog

Cybersecurity Predictions for 2020

Sharon Holland

The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before.  Each year we are seeing more and more challenges in the fight against cybercrime.  With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.

more →

Blog

CrowdStrike’s Adam Meyers on eCrime Actors’ Pivot to Ransomware

Sharon Holland

A recent article on Dark Reading by VP of Intelligence Adam Meyers at our partner Crowdstrike is titled “The Big E-Crime Pivot.” It puts forth the argument that cybercriminals “have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.”

For those that don’t have time to read the full article, we have collated some of the highlights:

What is the Pivot?

more →

Blog

What Should a Cyber Incident Playbook Include?

Alastair Horner

Do You Really Need A Cyber Incident Playbook?

As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different?  Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.

more →

Blog

Not What It SIEMs. How SMEs Can Unlock the Power of Logs Without a SOC

Max Pritchard

Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.

more →

Blog

Ransomware Attack Scenario at “Shoes-4-U” – How Would You React?

Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.

The Scenario

Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.

more →