PCI DSS v4.0, How Much Work is Involved?
PCI DSS v4.0 17 years, 3 months, and 7 days ago, Visa released the first version of the Payment Card Industry Data Security Standard (PCI DSS). 9 versions later, the PCI Security Standards Council (PCI SSC) is on the cusp of releasing the...
Cyber training is useless without staff empowerment
In House Security Training In-house security training is often a knee-jerk, last-minute moment for most companies, and course development is typically crammed into a CISO’s workload, which is already sitting at 110%. It’s not that the content isn’t good, or the...
Cyber Essentials and Cyber Essentials Plus
As you may have heard, there was recently a change in the requirements for Cyber Essentials (CE) and Cyber Essentials PLUS (CE+) on the 24th of January 2022. This has been described as the “biggest overhaul of the scheme’s technical controls since its launch”....
Breach Attack Simulation
There’s a reason why athletes simulate big match conditions when they play in a runup to a tournament and why actors do dress rehearsals before opening night. The closer you can get to what it feels like during an event, the better prepared you can be in case anything...
SCAMMERS AND HACKERS ARE NOT TAKING CHRISTMAS OFF
SCAMMERS AND HACKERS ARE NOT TAKING CHRISTMAS OFF, SO DON'T LET YOUR GUARD DOWN. This past year has been a long, tough year for most of us. Chances are that you would like nothing more than to relax, let your guard down (and your hair), and enjoy a well-deserved...
Understanding the concept of ‘Zero Trust’
In many cybersecurity discussions these days, you hear the term ‘zero trust.’ People are proclaiming it as the new, best way to keep an organisation safe from the wave of cybercrime which has broken over Britain’s shores in the last year. It’s important to...
To pay or not to pay?
In the UK right now, many businesses are asking themselves how they would respond to a ransomware attack, will they pay and what are their risks obligations if they are willing to do so. That’s because the number of incidents of ransomware attacks has...
The Significant Threats Facing UK Business Emerges In 2021 Census Report
Nine out of ten UK organisations are aware of a weak link in their cybersecurity defence. That means almost everyone is vulnerable to a hack or a cyber attack and staying safe online is more a matter of luck than foolproof defenses. This is just one of many...
How Good is your Incident Response Plan in the Event of a Cyberattack?
Preventing a data breach or hack is first prize for every cybersecurity company. But if and when an incident occurs, the way that the response is handled is so important to ensure a full and complete recovery for a business. That’s when the quality of your incident...
PEN TESTING, OR ETHICAL HACKING – WHAT IS IT?
PEN TESTING, OR ETHICAL HACKING, IS A VITAL PART OF MAINTAINING TOP NOTCH CYBERSECURITY. Every company that uses digital tools is vulnerable to hackers. No matter how big or small you are, there are actors out there looking to gain access to your system and...