MS Warns Over ClickFix Phishing Scam

Microsoft has alerted users to a rising “ClickFix” phishing campaign that tricks people into believing they need to resolve pressing security issues. Cybercriminals send seemingly urgent emails—posing as Microsoft notifications—that direct recipients to malicious websites or disguised links. Once users click, attackers harvest login credentials or inject malware into target systems. Microsoft stresses the importance […]

Read More

Apache Tomcat Vulnerability Draws Serious Security Concerns

A recently disclosed flaw in Apache Tomcat, a popular Java-based web server and servlet engine, has prompted urgent warnings from cybersecurity experts. According to the latest reports, attackers could exploit the vulnerability to run malicious code or escalate privileges within compromised systems, putting countless web services and applications at risk. Apache Tomcat powers a significant […]

Read More

What is network testing?

Many businesses will test their network to make sure it’s functioning properly and providing the right level of service for users. It therefore serves to guarantee working efficiency for internal processes and, where products and services are sold online, ensure a smooth customer experience. However, network testing is also important for business cyber security.   In […]

Read More

How to conduct a self-assessment for cyber essentials

Cyber essentials is a government-backed scheme designed to support the development of all UK businesses. Nevertheless, there are various requirements for organisations to meet the level of cyber security outlined by cyber essentials. Business leaders must then prove that they have taken steps to improve their cyber security infrastructure by submitting an official self-assessment.   In […]

Read More

How ISO27001 2022 protects against data breaches

The ISO 27001 is the international standard for information security. As new threats continue to emerge and existing ones evolve, meeting ISO 27001 standards become increasingly relevant for businesses in all sectors. It is designed to provide a framework for implementing an effective information security management system (ISMS). This helps protect against online threats, most […]

Read More

Differences between threat hunting and threat detection

When it comes to dealing with cyber security threats, there are many strategies that can be employed and approaches that can be taken. Two of the most widely recognised today are threat hunting and threat detection. It might seem like these practices come hand in hand, however, there are some important distinctions that set them […]

Read More

Who needs to be SOC2 compliant?

SOC2 is an important topic in the current security landscape, with many businesses making the decision to become SOC2 compliant. This can be very beneficial to businesses in various industries that provide services and systems to clients. In this article, we’ll be detailing what it means to be compliant and who should consider SOC2 for […]

Read More

What’s the difference between a security breach and a data breach?

The terms security breach and data breach are often used interchangeably, and whilst they both will typically occur in the same incident, they don’t always, and they have specific meanings. It is beneficial to have a good understanding of what each type of breach means, so your business can respond effectively if/when either a security […]

Read More

What is a Yubico security key?

As a business, effectively managing your passwords, access to sensitive information, and overall online security is essential. When it comes to securing accounts, two-factor authentication has become a widely used method of maintaining a high level of protection. Two-factor authentication often uses methods like texting a code to a phone number as identity confirmation. But […]

Read More