Social engineering is the manipulation or deception of individuals into revealing confidential and sensitive information or performing acts that may compromise an organisation’s security. Unlike traditional hacking,...
Cyber Essentials Update – The New Willow Self-Assessment Questionnaire
There are now references the Cyber Essentials requirements quoted throughout the assessment. Links are also provided to the Cyber Essentials Knowledge Hub set up by IASME to...
Transitioning from Military Service to a Career in Cybersecurity
The Royal Marines After nine rewarding years of service in the Royal Marines, I decided it was time for a new challenge. I sought a career that...
ESET Protect Advance vs. ESET Protect Elite: An In-Depth Comparison
In today’s world safeguarding data and ensuring online security is crucial for businesses globally, ESET – a software company specialising in cybersecurity – presents a variety of...
Understanding the security risks of Connected Cars
Automotive manufacturers are constantly looking for ways to evolve and improve the driving experience of their vehicles, making them more leisurely for consumers. Remote functions from apps,...
Why is Vulnerability Scanning so important?
As the Cyber Security threat landscape continues to evolve, the emphasis on regular updates is ever-present, with bad actors looking to exploit any vulnerabilities and gain unauthorised...
Online Threats in the Shadows – Why Dark Web Monitoring Matters
In this increasingly digital world, the internet has revolutionised how we conduct business, communicate, and live our lives. Yet, it has also given rise to the hidden...
Unlocking Data Resilience: A short guide to Data Loss Prevention & Azure Purview
The digital age has massively increased the amount of data organisations use for day-to-day business, which has triggered a sharp rise in Data Breach and Data Loss...
Protecting Your Digital Fortress: A Short Guide to Blue Teaming
When the world of cyber security is split into primary colours, ‘Blue’ is on the defence. In the dynamic world of cyber security, companies face a never-ending...
The True Value of Penetration Tests
“We use Anti-Malware software, why would we ever need a penetration test?” Unfortunately, this is a sentence that we hear all too often. As specialists in the...
ISO 27001:2022 – Implementation Pitfalls!
When working to establish an Information Security Management System in line with the requirements of the ISO 27001 standard it is easy to think that the main...
Small Budget, Big Protection: Top 5 Low-Cost Cyber Security Measures for Businesses
Fortify your Business without Breaking the Bank. Cyber Security can often seem like a daunting subject, with countless areas of an organisation to consider, alongside significant upfront...