Ransomware as a service – What your business needs to know By David Smith - June 7th, 2022 Posted in Information Security cyber security, raas, ransomware Ransomware as a Service (“RaaS”) is a business model in which malicious actors sell ready-to-use ransomware tools as a commodity for affi...
NCSC’s Ten Steps in-depth: Chapter 2 – Engagement and training By Hannah Pisani - June 1st, 2022 Posted in Information Security The National Cyber Security Centre’s (“NCSC”) Ten Steps to Cyber Security guidance aims to help medium and large organisations improve th...
The upcoming UK IoT security law: what you need to know By Hannah Pisani - April 19th, 2022 Posted in Information Security, News & Resources In November 2021, the United Kingdom’s Department for Digital, Culture, Media and Sport introduced the Product Security and Telecom...
Supply chain cyber security: is your business vulnerable? By Evalian® - April 12th, 2022 Posted in Information Security supply chain security, third party security Supplier cyber security risks refer to the threats of data loss, exposure or a breach of your own systems resulting from security inciden...
Cyberwarfare & potential cyber-collateral damage: what you need to know By Hannah Pisani - April 8th, 2022 Posted in Information Security, News & Resources cyberwarfare, information security Cyberwarfare or cyber terrorism refers to a form of security incident in which a nation-state actor or group attempts to damage another n...
NCSC’s 10 Steps In-depth: Chapter 1 – Risk management By Hannah Pisani - April 6th, 2022 Posted in Information Security cyber risk, cyber security, ncsc The National Cyber Security Centre’s (“NCSC”) 10 Steps to Cyber Security is guidance that aims to help medium and large organisations imp...
How to choose an incident response supplier By Evalian® - March 7th, 2022 Posted in Information Security No matter the size of your organisation, having an incident response plan in place is pivotal. Below, we offer advice on how to choose an...
SaaS application security: the common risks By Hannah Pisani - March 1st, 2022 Posted in Information Security SaaS security Modern software tools are typically software-as-a-service (“SaaS”) applications hosted and delivered to clients over the inte...