Cyber Plan
HOW TO MANAGE CYBER RISK In the current climate, the need for a clear understanding of the business risks as well as the tools and techniques available to deal with them is fundamental. The velocity of change and the magnitude of the problem is not always fully...
Social Engineering
SOCIAL ENGINEERING Businesses are experiencing an increase in the number of sophisticated and sustained threats carried out by organised criminals in the UK. This also includes the possibility of opportunistic attackers and potentially disgruntled ex-employees who...
Scenario based attack simulation
Whilst conventional assessments remain valuable tools for network security, they often miss those flaws that were previously known or for which no fix is available (it should be noted that these flaws have been proven to be effective against fully patched systems). ...
China Cyber Dilemma in the 21st Century
PEOPLE’S REPUBLIC OF CHINA’S PRACTICE OF NETWORK POWER In today’s world, the information technology revolution is changing with each passing day. In contemporary China, the development of the network business has advanced by leaps and bounds. From mobile payment...
Operational Resilience
In late 2019, early 2020, the world woke up to the first, in modern memory, a truly global pandemic. Prior to COVID-19, Business Continuity Professionals had to go cap in hand with line of business managers to try and perform the annual Business Impact Analysis (BIA),...
PCI DSS v4.0, How Much Work is Involved?
PCI DSS v4.0 17 years, 3 months, and 7 days ago, Visa released the first version of the Payment Card Industry Data Security Standard (PCI DSS). 9 versions later, the PCI Security Standards Council (PCI SSC) is on the cusp of releasing the...
Cyber training is useless without staff empowerment
In House Security Training In-house security training is often a knee-jerk, last-minute moment for most companies, and course development is typically crammed into a CISO’s workload, which is already sitting at 110%. It’s not that the content isn’t good, or the...
Cyber Essentials and Cyber Essentials Plus
As you may have heard, there was recently a change in the requirements for Cyber Essentials (CE) and Cyber Essentials PLUS (CE+) on the 24th of January 2022. This has been described as the “biggest overhaul of the scheme’s technical controls since its launch”....
Breach Attack Simulation
There’s a reason why athletes simulate big match conditions when they play in a runup to a tournament and why actors do dress rehearsals before opening night. The closer you can get to what it feels like during an event, the better prepared you can be in case anything...
SCAMMERS AND HACKERS ARE NOT TAKING CHRISTMAS OFF
SCAMMERS AND HACKERS ARE NOT TAKING CHRISTMAS OFF, SO DON'T LET YOUR GUARD DOWN. This past year has been a long, tough year for most of us. Chances are that you would like nothing more than to relax, let your guard down (and your hair), and enjoy a well-deserved...