The Kaseya cyber-attack: an important lesson in supply chain security By Hannah Pisani - August 3rd, 2021 Posted in Information Security cyber attack, cyber security, data breach, kaseya, ransomware, ransomware attack, risk July 2nd, 2021, was the start of a difficult period for IT management software firm, Kaseya. The company suffered a devastating ransomwar...
Just how big a threat is online crime? 2021 By Philip Harris - July 12th, 2021 Posted in Information Security cyber attack, cyber crime, cyber criminals, data security, information security, online crime 2021 update Online crime is a potent problem that isn’t going away. Two years ago, when we published the first instalment of this blog (s...
Penetration testing vs red team testing By Thomas O'Donnell - June 8th, 2021 Posted in Penetration Testing cyber, cyber attack, cyber resilience, cyber security, pen test, pen testing, penetration test, penetration testing, red team, red team assessment, red teaming There’s no better way to test the strength of your cyber security posture than to simulate an attack on your systems. This is where penet...
When do you need a penetration test? By Thomas O'Donnell - May 24th, 2021 Posted in Penetration Testing cyber, cyber attack, cyber essentials, cyber security, data security, pen test, penetration testing The news cycle is constantly awash with data breaches. From exercise bike providers to oil pipelines, it seems that businesses of all siz...
Penetration Test vs Vulnerability Scan: What’s the Difference? By Alex Harper - May 19th, 2021 Posted in Penetration Testing cyber attack, cyber security, pen test, penetration testing, vulnerability scan Finding, understanding and remediating security vulnerabilities is essential for a mature cyber security posture and strong cyber resilie...
CYBERUK 2021: What you need to know – updates and takeaways By Hannah Pisani - May 19th, 2021 Posted in Information Security cyber attack, cyber security, CYBERUK 2021 CYBERUK is the UK government’s flagship cyber security event, hosted by the National Cyber Security Centre (“NCSC”). Held annually, the c...
Benefits of working with a Security Consultant By Evalian® - October 26th, 2020 Posted in Information Security cyber attack, cyber security, Cyber security consultant, cyber security job, cyber security role, employee training, phishing, security awareness Headline-grabbing cyber attacks, you know the ones, “multi-national company ‘X’, has been hit by ransomware and has been demanded to pay ...
Cyber security incident response – a guide – 2021 update By Evalian® - May 18th, 2020 Posted in Information Security cyber, cyber attack, cyber incident, data map, incident response, incident response plan, information security, response plan, risk management The Covid-19 pandemic saw businesses across the globe have to deal with unprecedented challenges – alongside the growing trend of f...