Who needs to be SOC2 compliant?

SOC2 is an important topic in the current security landscape, with many businesses making the decision to become SOC2 compliant. This can be very beneficial to businesses in various industries that provide services and systems to clients. In this article, we’ll be detailing what it means to be compliant and who should consider SOC2 for […]

Read More

What’s the difference between a security breach and a data breach?

The terms security breach and data breach are often used interchangeably, and whilst they both will typically occur in the same incident, they don’t always, and they have specific meanings. It is beneficial to have a good understanding of what each type of breach means, so your business can respond effectively if/when either a security […]

Read More

What is a Yubico security key?

As a business, effectively managing your passwords, access to sensitive information, and overall online security is essential. When it comes to securing accounts, two-factor authentication has become a widely used method of maintaining a high level of protection. Two-factor authentication often uses methods like texting a code to a phone number as identity confirmation. But […]

Read More

Remote Working Security Risks and Tips

Working remotely has become a popular model for many businesses since the coronavirus pandemic. Fully remote or hybrid working can be a useful way to save money and boost productivity. However, the reliance on our devices and technology when working from home can come with inherent risks and vulnerabilities businesses should be aware of. In […]

Read More

What is the dark web and how does KELA help?

The internet of today is a near endless resource for businesses and consumers. Although it wasn’t always this way, and the way we browse the web has changed drastically since its early years. One of the most controversial developments has been the creation of the dark web. While it is still a relatively new concept, […]

Read More

What is ISO 27001 and Cyber Essentials and how do they differ?

In the UK there are two main cyber security certifications available for organisations – the ISO 27001 and Cyber Essentials. Both serve to indicate that the certificate holder is cyber secure to a certain level, which can yield business benefits. However, many professionals argue each represents different standards of cyber security.  Here, we’ll discuss the […]

Read More

What constitutes a breach of data protection?

Data protection breaches are a risk to any business that’s responsible for handling people’s personal data. This includes employees’ as well as members of the public, although the more data that’s processed, the greater the risk. You may have seen some high profile data breaches in the news, such as the MOVEit hack that targeted […]

Read More

What are some common cyber security threats facing businesses?

The landscape of cyber security has shifted drastically in recent years. With every innovative comes new opportunities for cyber criminals to attempt to gain access to business systems. Artificial intelligence, for instance, has been used to bring outdated methods of cyber attack back to the frontlines. Indeed, this is one reason cyber security threats for […]

Read More

What is a common indicator of a phishing attempt?

Defending your organisation from phishing attacks is a constant struggle. This is because cyber criminals are always using different tactics to try and dupe your employees. Regardless of the exact motive behind a phishing attempt, the worst-case scenario can cause a vast amount of damage to the business. The result can be data breaches, leading […]

Read More