Blog

What Should a Cyber Incident Playbook Include?

Alastair Horner

Do You Really Need A Cyber Incident Playbook?

As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different?  Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.

more →

Blog

Not What It SIEMs. How SMEs Can Unlock the Power of Logs Without a SOC

Max Pritchard

Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.

more →

Blog

Top 6 Risks to the Enterprise from The Internet of Things (IoT)

Sharon Holland

IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network.  The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025.  Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.

more →

Blog

Penetration Testing vs DDoS Testing

John Baldock

We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers.  However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough.  This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.

more →