Blog

WFH Cyber Security Guide

Many employers are asking people to work from home in response to the COVID-19 coronavirus and the government’s advice. The current guidance recommends remote working wherever possible and to partake in social distancing as part of the delay phase strategy. Other people are self-isolating because they have symptoms or wish to work from home by […]

Read more

March 22, 2020

Dan Richards

Mobile Application Testing

Mobile applications, or apps, are increasingly a part of everyday life. Often, apps are fundamental to business operations, and this is becoming the norm. App security is vital, and mobile application testing is something that all companies should partake. Mobile application testing is essentially a penetration test for your mobile app.   A security breach through a mobile […]

Read more

January 18, 2020

Dan Richards

External vs Internal Network Penetration Testing

Strong network security is a fundamental responsibility for all organisations and businesses. Weak cybersecurity can be extremely damaging to your company with severe brand and financial implications. External and internal network penetration testing is the solution to security testing and leads to remedial actions. Pen tests are carried out by security companies with ethical hackers that have […]

Read more

January 12, 2020

Dan Richards

What is vulnerability scanning?

Vulnerability scanning is one of the most critical responsibilities of an internal IT security team or a certified external security company. The consequences for a company that does not effectively manage vulnerabilities are severe. Vulnerabilities and weaknesses are an open door for cybercriminals to hold your company to ransom (by installing ransomware), steal customer data, and […]

Read more

January 3, 2020

Dan Richards

Mitigating Malware

Mitigating malware is about reducing the risk of infection by malware. Your organisation can take pre-emptive steps and prevent cybercrime. While it is impossible to defend 100% against malicious software, the risks are hugely reduced, when proper preparation and security tasks are performed. A cybercrime event can be extremely costly to your operation and its […]

Read more

December 13, 2019

Dan Richards

Cybersecurity steps for your business

When planning and implementing practices for cybersecurity within your business, there are some things to consider. So, if you are looking for advice on cybersecurity and want to know where to start, read on. The main considerations for cybersecurity Your company must maintain the safety of the data you hold. Because of this, it is […]

Read more

December 7, 2019

Dan Richards

Cyber Essentials – The Ultimate Guide

Ultimate Guide to Cyber Essentials Cyber attacks are becoming more, and more of a threat to individuals and businesses as criminals take their efforts online in their attempts to make money illegally. Whether it’s protecting the data of your employees, securing payment information or ensuring your customers’ details aren’t compromised. Protection from online attacks is […]

Read more

November 30, 2019

Dan Richards

What is a security operations centre (SOC)?

A security operations centre houses an information security team. The team is made up of both security engineers and analysts and oversee the security operation for an entire organisation. With responsibility for monitoring a company‚Äôs security stance, the team manages this on an ongoing basis. Detection and response to cybersecurity incidents are a vital part […]

Read more

October 4, 2019

Dan Richards

LastPass patched a bug that could have made passwords available

In the last few days, LastPass, a popular password manager, has patched a bug that cybercriminals could have exploited. The vulnerability was discovered by staff at Google Project Zero and they highlighted that it could be used to steal user security credentials. In a hacking technique called clickjacking, an extension-generated pop-up window might be exploited […]

Read more

September 17, 2019

Dan Richards