Penetration testing vs ethical hacking

More and more high-profile organisations are being hit with cyber-attacks and data breaches. At the start of June, it was the BBC, Boots, British Airways, and Air Lingus. At the time of writing, digital health company Kannact Inc has had their network server breached, affecting over 100,000 users. With big players being affected, small and […]

Read More

Why are data protection solutions important?

With online spaces being as highly trafficked as they are, it’s not surprising that many companies exist solely to gather user data. Other businesses will process and store consumer data to help direct their operations. In either case, this creates more opportunities for sensitive data to be accessed by criminals through cyber-attacks.  In this blog […]

Read More

Common cyber security mistakes employees make

The people that make up a business are arguably the most important factor when it comes to cyber security. The most advanced software-based security measures can be rendered useless when employees unwittingly grant criminals access. As a result, a large proportion of cyber-attacks today target the human parts of an organisation’s security infrastructure.  In this […]

Read More

Everything you need to know about Ironscales

Self-learning technologies are the next step in cyber security consulting for businesses. Ironscales utilises machine learning to provide email security services that protect against the more advanced threats of today. It is, therefore, a popular option for mid and large sized organisations that gather lots of valuable information, either internally or about their customer base. […]

Read More

How does Galaxkey work?

Now more than ever the process of secure communications within businesses is vitally important. Since the coronavirus pandemic, an increasing number of businesses have adopted a hybrid working model or even fully remote. This means staff need to rely more heavily on digital communication with each other to carry out their work and ensure smooth […]

Read More

What is cloud native security?

Modern application development techniques are constantly innovating, which is a good thing for streamlining and making things easier for businesses working digitally. However, it also creates new challenges for security teams to keep up with. Cloud-native technologies have expedited the production process, but traditional security models are not equipped to handle the complexities of these […]

Read More

Why is cloud penetration testing important?

Today, more businesses than ever use external computing infrastructure like cloud services to support their operations. It allows businesses to save money and scale operations without investing in physical infrastructure. While this is useful, it also creates another avenue which for malicious parties to exploit. As such, in cyber security it’s important that organisations have […]

Read More

A guide to ISO 27001 for businesses

Today, businesses of all sizes deal with vast amounts of important information. This can be relating to the business’s internal functions, its customers, or the industry overall. Unless managed accordingly, large volumes of information can pose a security challenge for business owners. ISO 27001 serves as a framework for businesses on how to securely process […]

Read More

How to get Cyber Essentials Certification

Last year the UK government revealed a planned £2.6 billion investment as part of their 2022-2030 cyber security strategy. However, the government’s Cyber Essentials Certification shows they’ve been paying attention to cyber security for the last decade. This scheme is designed to grant businesses a base level of protection that will shield them from 80% […]

Read More