Skip to Content

Social engineering is the manipulation or deception of individuals into revealing confidential and sensitive information or performing acts that may compromise an organisation’s security. Unlike traditional hacking,...

Learn more

Cyber Essentials Update – The New Willow Self-Assessment Questionnaire

There are now references the Cyber Essentials requirements quoted throughout the assessment. Links are also provided to the Cyber Essentials Knowledge Hub set up by IASME to...

Learn more

Transitioning from Military Service to a Career in Cybersecurity

The Royal Marines After nine rewarding years of service in the Royal Marines, I decided it was time for a new challenge. I sought a career that...

Learn more

ESET Protect Advance vs. ESET Protect Elite: An In-Depth Comparison

In today’s world safeguarding data and ensuring online security is crucial for businesses globally, ESET – a software company specialising in cybersecurity – presents a variety of...

Learn more

Understanding the security risks of Connected Cars

Automotive manufacturers are constantly looking for ways to evolve and improve the driving experience of their vehicles, making them more leisurely for consumers. Remote functions from apps,...

Learn more
Why is Vulnerability Scanning so important?

Why is Vulnerability Scanning so important?

As the Cyber Security threat landscape continues to evolve, the emphasis on regular updates is ever-present, with bad actors looking to exploit any vulnerabilities and gain unauthorised...

Learn more

Online Threats in the Shadows – Why Dark Web Monitoring Matters

In this increasingly digital world, the internet has revolutionised how we conduct business, communicate, and live our lives. Yet, it has also given rise to the hidden...

Learn more

Unlocking Data Resilience: A short guide to Data Loss Prevention & Azure Purview

The digital age has massively increased the amount of data organisations use for day-to-day business, which has triggered a sharp rise in Data Breach and Data Loss...

Learn more

Protecting Your Digital Fortress: A Short Guide to Blue Teaming

When the world of cyber security is split into primary colours, ‘Blue’ is on the defence. In the dynamic world of cyber security, companies face a never-ending...

Learn more

The True Value of Penetration Tests

“We use Anti-Malware software, why would we ever need a penetration test?” Unfortunately, this is a sentence that we hear all too often. As specialists in the...

Learn more

ISO 27001:2022 – Implementation Pitfalls!

When working to establish an Information Security Management System in line with the requirements of the ISO 27001 standard it is easy to think that the main...

Learn more

Small Budget, Big Protection: Top 5 Low-Cost Cyber Security Measures for Businesses

Fortify your Business without Breaking the Bank.  Cyber Security can often seem like a daunting subject, with countless areas of an organisation to consider, alongside significant upfront...

Learn more