Cloud security misconfigurations & how to prevent them By Marcus Chambers - May 30th, 2023 Posted in Information Security cloud, cloud storage, cyber security, information security, misconfiguration What are cloud misconfigurations? A cloud misconfiguration is an incorrect configuration of a cloud system that may lead to vulnerabiliti...
Business Email Compromise (BEC): What it is and how to stop it? By Marcus Chambers - May 23rd, 2023 Posted in Information Security BEC attacks on the rise 2023 We’re well into 2023 and there’s no doubt that email is still critical to the operations of orga...
Ransomware 101: Three ways to protect your business 2023 By Marcus Chambers - April 20th, 2023 Posted in Information Security Our expert cyber security consultants have advice on ways to protect your business from a ransomware attack. This blog covers three of th...
How to identify phishing emails – 2023 update By Marcus Chambers - March 1st, 2023 Posted in Information Security business, cyber attacks, cyber crime, cyber security, data breach, email fraud, infosec, inormation security, online crime, phishing It’s no surprise that the last 3 years have seen a surge in cybercrime, largely due to the COVID-19 pandemic, millions of workforce...
Cyberwarfare & potential cyber-collateral damage: what you need to know By Marcus Chambers - April 8th, 2022 Posted in Information Security, News & Resources cyberwarfare, information security Cyberwarfare or cyber terrorism refers to a form of security incident in which a nation-state actor or group attempts to damage another n...
What is ‘Zero Trust Security’? By Marcus Chambers - February 8th, 2022 Posted in Information Security Zero Trust security refers to a collection of cyber security principles that focus on moving cyber security defences away from the castle...
Does your business need a bug bounty programme? By Marcus Chambers - December 28th, 2021 Posted in Information Security bug bounties, bug bounty, cyber security, security programme A bug bounty programme is a colloquial term for a vulnerability disclosure programme. It is the process in which an organisation incentiv...
Addressing the information security risks of digital supply chains By Marcus Chambers - November 30th, 2021 Posted in Information Security business security, cyber risks, cyber security, digital supply chain, information security, supply chains, third party suppliers Today’s supply chains are often opaque and complex, compromising mass ecosystems of vendors, suppliers and partners connected by servers,...