Author: Rob McBride
Top 10 Free Cyber Security Tools for SMBs in 2024
Introduction With the frequency and sophistication of cyber attacks continuing to rise, it’s essential for business owners, IT professionals, and…
Telecommunications Security Act 2021 Compliance
The Telecommunications Security Act is a transformative piece of legislation – we discuss how to ensure rapid compliance.
What is a Red Team Exercise?
Red team exercises are growing in popularity, but what is a red team exercise, and should you perform one on…
The Importance of Data Privacy Training
With data privacy training, the focus is on your customers and how you gain their trust that you will protect…
Top UK Cyber Security Conferences in 2022
Here’s our rundown of the top UK Cyber Security Conferences in 2022. We hope to see you at one of…
How to obtain the ISO 27001 certification
It’s always nice to add some credentials to your company name. We explain how to obtain the ISO 27001 certification…
When do you need a DPO (Data Protection Officer)?
DPOs can significantly improve your level of compliance with GDPR, but when do you need to a DPO to meet…
What is a vCISO (and should you hire one)?
The adoption of vCISOs is growing in popularity – we explain what is a vCISO and what advantages they bring…
How to Become a Data Protection Officer (DPO)
Many companies are choosing to outsource the role of DPO to skilled consultants – we discuss how to become a…
How to get the Cyber Essentials Certification
Have you heard about Cyber Essentials yet? We explain how to get the Cyber Essentials certification and how this could…
How to become a Virtual CISO (vCISO)
Companies are turning to Vitual CISOs to drive cyber security strategy and implementation. We discuss what it takes to become…
Creating a culture of cyber security at work
Creating a strong culture of cyber security at work adds an additonal and invaluable line of cyber security defence for…
The Importance of Data Privacy for Travel Companies
Travel companies process vast quantities of PII data, putting them at a greater risk of data breaches. We explore the…
Is it time to go paperless to improve security?
Is it time to scrap your print infrastructure and go paperless? It might sound crazy, but only a fifth of…
The real cost of a cybersecurity breach to your business
What would the cost of a cybersecurity breach be to your business? Many businesses struggle to estimate the true impact…
3 reasons why cybersecurity projects fail
The impact of cyber security projects failing is significant, since the organisation will likely remain open to attack. With the…
Cyber Insurance: Do you really need it?
Dedicated cyber security insurance won’t stop cybercriminals, but it can keep you on a stable financial footing if a major…
Cyber Security Podcasts you must listen to in 2020
Stay up to date with the latest cyber security news and expert opinions in 2020. Simply subscribe to these podcasts…
Cyber Security Conferences 2020: 6 Essential Events
There is a range of information security conferences held in major cities all over the world including New York, London…
Women in Cybersecurity: Closing the Industry Gender Gap
Cybersecurity departments voice concerns that their teams are understaffed, but women continue to be under-represented in the cybersecurity industry.
Stolen Credentials – How to Keep Your Data Secure
Are you prepared for a data breach and stolen credentials? Here’s how to keep your login details safe from cybercriminals.
Ransomware Attacks: How to Protect Your Businesses
The perpetrators of ransomware attacks are increasingly targeting organisations instead of individuals. Now more than ever, businesses need a strategy…
Trojans, RATs and Cryptominers Among Top Malware Threats of 2019
With the help of CIS we’re sharing the top 10 malware threats in 2019. Find out the latest cybersecurity threats…
DDoS Attacks Become More Powerful as More Business Shifts Online
With recent DDoS attacks on the rise, what security tools are available? Every business must prepare to stop DDoS attacks…
How Mobile Cyberattacks Work and How to Avoid Them
Mobile cyberattacks are a risk but they can be prevented. Here are our tips on how to build a cybersecurity…
The Internet of Fridges and Bridges
Due to its many benefits, it is fantastic to see the IoT and its range of applications growing exponentially. But…
Zero days and counting
The battle against cybercrime is a constant race against time. Each day, new vulnerabilities are discovered and whilst the identified…
The Trouble with Pa$$w0rds
Since the dawn of the internet, security professionals have wrestled with the weaknesses of password-based security. With so many known…
Big bounty on offer for cyber experts
To incentivise the discovery of bugs before the criminals do, a growing number of companies have set up “bug bounty”…
Remote Workers Require Better BYOD Security
Half of the UK workforce could be working remotely in 2020 and many organizations now actively encourage this trend with…