Blog

What Is CASB and Where Does It Sit In The Modern Threat Landscape?

CASBs (Cloud Access Security Brokers) sit between an organization’s on-premises infrastructure and the cloud provider to ensure enterprise security policies are enforced. CASBs allow enterprises to go beyond their own infrastructure to ensure network traffic between on-premises devices and the cloud comply with their security policies.

Although still relatively young, CASBs have matured a lot recently, having evolved to the point where many analysts feel CASB will soon be as important as firewalls were when we were all working on PCs instead of laptops. 

more →

Blog

Remote Working and Keeping Safe

Iain Westwood

Over the years, Remote Access technology has developed to a degree where a lot of businesses can shift from an office-based to a working from home model to allow business continuity in challenging times – as many have done recently in light of the COVID-19 pandemic.

Unfortunately, despite global events, there are still those who will exploit others for financial gain meaning that secure working practices are more important than ever. 

more →

Blog

XSS, SQL injection, and WAF

John Baldock

XSS – Cross-site scripting

XSS is a common form of injection attack on public facing web servers. Any web server can be vulnerable to attack, and websites now are feature-rich with multiple embedded databases, comments sections, and media… all of which increase the vector types that can be attempted by cyber criminals for various reasons.

more →

Blog

Cybersecurity for small businesses

Iain Westwood

The impact of data breaches, network hacks or well-crafted phishing campaigns is often reported in the press.  These reports often cover reputational loss and financial cost to the victim that can run into tens or hundreds of thousands of pounds.  But what about the little guy?

Email attacks

Small businesses can often be the focus of specific targeted email-based attacks.  

more →

Blog

Don’t be the next Travelex!

Iain Westwood

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →