Insights
Top 10 Free Cyber Security Tools for SMBs in 2024
Introduction With the frequency and sophistication of cyber attacks continuing to rise, it’s essential for business owners, IT professionals, and…
How Much Does a Virtual CISO Cost in 2024?
Many CxO’s, founders and established IT professionals struggle to get clarity on how much a vCISO service costs and the…
Expert Guide to Technical Due Diligence for Startups
Unlock the secrets of technical due diligence for startups. This guide covers everything from assessing IT infrastructure to ensuring robust…
Cyber Security for SMBs Drives Business Growth
Investing in cyber security for SMBs isn’t just about protection—it’s a growth strategy. For SMBs, robust security measures can open…
Do Small Companies Need a CISO?
In the ever evolving world of digital business where companies need to balance security and customer trust with real-world realities…
Telecommunications Security Act 2021 Compliance
The Telecommunications Security Act is a transformative piece of legislation – we discuss how to ensure rapid compliance.
How to Recover From a Cyber Attack
Discover the steps to take that will help you recover from a cyber attack such as ransomware, malware or a…
What is a Red Team Exercise?
Red team exercises are growing in popularity, but what is a red team exercise, and should you perform one on…
The Importance of Data Privacy Training
With data privacy training, the focus is on your customers and how you gain their trust that you will protect…
Top UK Cyber Security Conferences in 2022
Here’s our rundown of the top UK Cyber Security Conferences in 2022. We hope to see you at one of…
How to obtain the ISO 27001 certification
It’s always nice to add some credentials to your company name. We explain how to obtain the ISO 27001 certification…
When do you need a DPO (Data Protection Officer)?
DPOs can significantly improve your level of compliance with GDPR, but when do you need to a DPO to meet…
What is a vCISO (and should you hire one)?
The adoption of vCISOs is growing in popularity – we explain what is a vCISO and what advantages they bring…
How to Become a Data Protection Officer (DPO)
Many companies are choosing to outsource the role of DPO to skilled consultants – we discuss how to become a…
How to get the Cyber Essentials Certification
Have you heard about Cyber Essentials yet? We explain how to get the Cyber Essentials certification and how this could…
How to become a Virtual CISO (vCISO)
Companies are turning to Vitual CISOs to drive cyber security strategy and implementation. We discuss what it takes to become…
Creating a culture of cyber security at work
Creating a strong culture of cyber security at work adds an additonal and invaluable line of cyber security defence for…
The Importance of Data Privacy for Travel Companies
Travel companies process vast quantities of PII data, putting them at a greater risk of data breaches. We explore the…
Is it time to go paperless to improve security?
Is it time to scrap your print infrastructure and go paperless? It might sound crazy, but only a fifth of…
The real cost of a cybersecurity breach to your business
What would the cost of a cybersecurity breach be to your business? Many businesses struggle to estimate the true impact…
3 reasons why cybersecurity projects fail
The impact of cyber security projects failing is significant, since the organisation will likely remain open to attack. With the…
Cyber Insurance: Do you really need it?
Dedicated cyber security insurance won’t stop cybercriminals, but it can keep you on a stable financial footing if a major…
Cyber Security Podcasts you must listen to in 2020
Stay up to date with the latest cyber security news and expert opinions in 2020. Simply subscribe to these podcasts…
Cyber Security Conferences 2020: 6 Essential Events
There is a range of information security conferences held in major cities all over the world including New York, London…
Women in Cybersecurity: Closing the Industry Gender Gap
Cybersecurity departments voice concerns that their teams are understaffed, but women continue to be under-represented in the cybersecurity industry.
Stolen Credentials – How to Keep Your Data Secure
Are you prepared for a data breach and stolen credentials? Here’s how to keep your login details safe from cybercriminals.
Ransomware Attacks: How to Protect Your Businesses
The perpetrators of ransomware attacks are increasingly targeting organisations instead of individuals. Now more than ever, businesses need a strategy…
Trojans, RATs and Cryptominers Among Top Malware Threats of 2019
With the help of CIS we’re sharing the top 10 malware threats in 2019. Find out the latest cybersecurity threats…
DDoS Attacks Become More Powerful as More Business Shifts Online
With recent DDoS attacks on the rise, what security tools are available? Every business must prepare to stop DDoS attacks…
How Mobile Cyberattacks Work and How to Avoid Them
Mobile cyberattacks are a risk but they can be prevented. Here are our tips on how to build a cybersecurity…
The Internet of Fridges and Bridges
Due to its many benefits, it is fantastic to see the IoT and its range of applications growing exponentially. But…
Zero days and counting
The battle against cybercrime is a constant race against time. Each day, new vulnerabilities are discovered and whilst the identified…
The Trouble with Pa$$w0rds
Since the dawn of the internet, security professionals have wrestled with the weaknesses of password-based security. With so many known…
Big bounty on offer for cyber experts
To incentivise the discovery of bugs before the criminals do, a growing number of companies have set up “bug bounty”…
Remote Workers Require Better BYOD Security
Half of the UK workforce could be working remotely in 2020 and many organizations now actively encourage this trend with…