Blog
General Information

Ransomware: What you need to know

What is ransomware? Ransomware is one of the fastest-growing forms of cyber attack. According to Bitdefender, there are roughly 2.8 million known unique samples of ransomware, and this number is growing. Ransomware attacks are becoming more sophisticated and cyber attackers are demanding higher payments from their victims. How does ransomware …

Read More
Uncategorized

Small Phish, really big pond.

Phishing is now THE most common tool used by cyber criminals and is something we prioritise in any cyber security awareness campaign. If you have just emerged from a cryogenically frozen state, and are blissfully unaware of phishing, here is a brief overview… The attacker creates an email full of …

Read More
Uncategorized

Cyberattacks, far too costly to ignore

Almost half of UK businesses say they have suffered a data breach in the past 12 months and the average cost to a large enterprise is £20,000 Cyberattacks are becoming more frequent and more costly. If companies want to protect their bottom line and safeguard their operational capabilities, they must …

Read More
Best Practice

‘I’d never be targeted with phishing emails’… Wrong.

Phishing is BIG business for cyber criminals. According to PhishMe’s Enterprise Phishing Resiliency and Defense Report 2017, phishing attacks rose by 65% last year, with the average attack costing mid-sized companies $1.6 million (about £1.2 million). This is despite many respondents claiming that they are no longer fooled by cyber criminals’ …

Read More
General Information

You’ve had a data breach, WHAT TO DO?!

You’ve had a data breach, WHAT TO DO?! Responding to a data breach quickly is very important, the slower you respond the bigger the problems your company could face! Follow the tips below as soon as you are aware that your business has been hacked. 1. Freeze everything Any devices …

Read More
Intelligence

Data Discovery: Embarking on a Digital Treasure Hunt

Are you ready for 32 times more data in the next five years? How will you execute data discovery at that time? In an environment of big data, social media, mobility and cloud platforms, effective application of security controls throughout the critical data discovery life cycle is increasingly challenging. A company may amass a …

Read More
General Information

Would you understand a targeted attack?

Understanding Targeted Attacks Targeted attacks are (or should be) an important concern to large organizations anywhere. Well-designed attacks proceed in six stages that show how attackers progress within their targets.  It has been several years since targeted attacks first emerged onto the threat landscape, and both the threats and our understanding of them …

Read More
General Information

What is Cloud Security?

Cloud computing security refers to the set of procedures, processes and standards designed to provide information security assurance in a cloud computing environment.  Cloud computing security addresses both physical and logical security issues across all the different service models of software, platform and infrastructure. It also addresses how these services …

Read More
General Information

The Phases of a Cyber Attack. BE AWARE!

Both malicious attackers and professional penetration testers utilize various stages or phases in their attacks or penetration test.  The Phases of an Attack / Penetration Testing Both malicious attackers and penetration testers depend in several phases in their attacks, namely:  Reconnaissance  Scanning  Exploitation  While malicious attackers often go further, into …

Read More
Compliance

Why is Data Loss Prevention Important?

Why Is Data Loss Prevention Important?  According to a Gartner CISO survey, data loss prevention (DLP) is a top priority for CISOs. Data loss prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of the enterprise and prevents …

Read More