Skip to page content
Client Hub Tel 01892 830111

Blog: Cyber Security

Filters:

Cybersecurity: The Golden Rules

Our Golden Rules are a quick and easy start to protecting your organisation from the cyber criminals.

Read More

How can your business cyber security be strengthened with OSINT?

OSINT is an acronym for Open Source Intelligence. Essentially gathering and using information freely scattered about the interweb. How could this help a business in terms of  Cyber Security?

Read More

Log4J vulnerability: What it is and what to do about it

There have been some interesting developments in the security world over the last few days which we wanted to make you aware of. A recent vulnerability was published in a Java based log processing tool (Log4J) which has been assigned the highest severity rating.

Read More

Cyber Essentials: The security MOT

When you drive your car, you can trust that its safe because each year you go and get that all important MOT; checking that the tyres are legal, or the lights are working, nothings loose and about to fall apart. Guess what?! Cyber Essentials is sort of the same, but for cybersecurity!

Read More

Security in the hybrid workplace: what does good look like?

As the CORONApocalypse continues to fade and we all get back to whatever normal is, it's a good opportunity to look back at the changes we have made in the workplace over the last 12-16 months to keep our businesses going and ask ourselves, "is this good?".

Read More

It’s time to get serious about Cybersecurity

We always talk about the technical elements of cybersecurity, what tools, software, and processes that you should use to protect your business. Cybersecurity and data protection (or the failure to truly consider this as an essential forethought) rather than an afterthought is by far of significance importance today.

Read More

Microsoft email server hack. Is your business at risk?

We’re all aware that we need to be vigilant of our own cyber security and it goes without saying that this should be of paramount importance to any business. The news of the recent Microsoft hack is a stark reminder of just how vital it is to have cyber security monitoring in place.

Read More

Cyber Security: Playing the Blame Game

I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they're called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I'll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.

Read More

Common phishing types

Cybercrime is on the rise and the types of phishing scams are evolving, our ability to identify them has never been more important in both protecting ourselves, but also the organisations that we are part of. There are many types of phishing scams with many different tactics employed, in this article we look at some of the main phishing scams used by the criminals, the intent or nature them and advice on how to deal with them.

Read More

Spotting a phish

Phishing is the most popular form of cyber crime. It’s scam form that has been around for years from the comical prince to the current COVID-19 disguise.

Read More

Choosing an MFA Solution

By now I'm sure you're all familiar with the terms "MFA (Multi Factor Authentication), 2FA (Two Factor Authentication) or Strong Authentication" over the last few years, for those of you that aren’t these are largely the same thing (there are some technical & semantical differences but for simplicity let's not get into those) in that they support your traditional Username & Password

Read More

The Dark Web: What is it?

The dark web is term that is used often in the news, when you hear about data breaches and in films used by clandestine groups, but do you really know what it is?

Read More

Contact us

Get in touch with us