Cyber Security Essentials

2022 in review at NCSC: Pleasure and Pain

Each year the UK’s NCSC, like many other intelligence and government agencies, releases a report on the year – its activities and successes, the challenges and changing environment. The report is available here and a summary is also available. For...

Read More

Huntsman Security shares 2023 cyber security predictions

Huntsman Security has published its cyber security predictions for 2023, including the importance of cyber security posture management, systematic risk management, and how ongoing changes will continue to be driven by the insurance industry. In addition,...

Read More

Operationalising IT security reviews

Commissioning or undertaking a security review is a familiar process for most security managers, internal and external auditors, CISOs and risk owners. The growing responsibilities of directors for the effective management of IT risk almost guarantees...

Read More

Learnings from Black Friday and Manic (Cyber) Monday

With the recent past focussed on COVID-19, and lockdowns now starting to end around the world (certainly in the UK, Australia and the US), for many it’s time to turn their attention to one of the biggest retail events on the calendar. This year, in...

Read More

The Damage of Downtime

Downtime disruption There has recently been a prominent example of how damaging a serious IT outage can be.  The hours-long interruption in service that Facebook (and its other platforms Instagram and WhatsApp) suffered recently, made news around the...

Read More

Ransomware readiness 3 of 3: Recovery

How to deal with a ransomware attack is currently a matter of some debate. There is a school of thought that paying the ransom is a bad idea because it rewards the criminal and can be used to fund further attacks, possibly even on the same organisation. ...

Read More

Ransomware readiness 2 of 3: Containment

In a previous blog, we talked about the rising threat of ransomware, how many solutions and approaches are geared towards detecting it, and how there are key things organisations they can do to prevent a ransomware attack. We spoke about some recommended...

Read More
1 2 3 4