What is ISO 27001 and Cyber Essentials and how do they differ?

In the UK there are two main cyber security certifications available for organisations – the ISO 27001 and Cyber Essentials. Both serve to indicate that the certificate holder is cyber secure to a certain level, which can yield business benefits. However, many professionals argue each represents different standards of cyber security.  Here, we’ll discuss the […]

Read More

What constitutes a breach of data protection?

Data protection breaches are a risk to any business that’s responsible for handling people’s personal data. This includes employees’ as well as members of the public, although the more data that’s processed, the greater the risk. You may have seen some high profile data breaches in the news, such as the MOVEit hack that targeted […]

Read More

What are some common cyber security threats facing businesses?

The landscape of cyber security has shifted drastically in recent years. With every innovative comes new opportunities for cyber criminals to attempt to gain access to business systems. Artificial intelligence, for instance, has been used to bring outdated methods of cyber attack back to the frontlines. Indeed, this is one reason cyber security threats for […]

Read More

What is a common indicator of a phishing attempt?

Defending your organisation from phishing attacks is a constant struggle. This is because cyber criminals are always using different tactics to try and dupe your employees. Regardless of the exact motive behind a phishing attempt, the worst-case scenario can cause a vast amount of damage to the business. The result can be data breaches, leading […]

Read More

Penetration testing vs ethical hacking

More and more high-profile organisations are being hit with cyber-attacks and data breaches. At the start of June, it was the BBC, Boots, British Airways, and Air Lingus. At the time of writing, digital health company Kannact Inc has had their network server breached, affecting over 100,000 users. With big players being affected, small and […]

Read More

Why are data protection solutions important?

With online spaces being as highly trafficked as they are, it’s not surprising that many companies exist solely to gather user data. Other businesses will process and store consumer data to help direct their operations. In either case, this creates more opportunities for sensitive data to be accessed by criminals through cyber-attacks.  In this blog […]

Read More

Common cyber security mistakes employees make

The people that make up a business are arguably the most important factor when it comes to cyber security. The most advanced software-based security measures can be rendered useless when employees unwittingly grant criminals access. As a result, a large proportion of cyber-attacks today target the human parts of an organisation’s security infrastructure.  In this […]

Read More

Everything you need to know about Ironscales

Self-learning technologies are the next step in cyber security consulting for businesses. Ironscales utilises machine learning to provide email security services that protect against the more advanced threats of today. It is, therefore, a popular option for mid and large sized organisations that gather lots of valuable information, either internally or about their customer base. […]

Read More

How does Galaxkey work?

Now more than ever the process of secure communications within businesses is vitally important. Since the coronavirus pandemic, an increasing number of businesses have adopted a hybrid working model or even fully remote. This means staff need to rely more heavily on digital communication with each other to carry out their work and ensure smooth […]

Read More