top of page
Articles
Some light reading on cyber security, data protection and resilience


AI: A Force for Good
While malicious actors wield the potential of artificial intelligence (AI) to launch ever-more sophisticated attacks, AI is increasingly...
Feb 14, 20242 min read


Should your business get Certified
Obtaining industry certifications like Cyber Essentials, ISO27001 or SOC 2 (Type 2) can bring significant benefits to an organisation.
Jan 29, 20243 min read


A guide to strengthening your organisation’s Security Culture
A guide to strengthening your organisation’s Security Culture
Jul 15, 20238 min read


You got the CISO role, now what?
CISO's have a lot on their plate. There are some key areas they need to focus on.
Jun 26, 20232 min read


Security Metrics
There are a variety of metrics that organisations can use to measure their cyber security posture.
May 29, 20232 min read


Communicating with the Board
it is important for the Board to have a clear understanding of the organisation's cyber security posture and risk management strategies
May 22, 20232 min read


Business Continuity Planning
Business Continuity Planning is the process of creating plans that outline the steps required to continue operations during disruption
May 15, 20232 min read


What is a RoPA?
Record of Processing Activities is a requirement of data protection laws that organisations must record all their processing activities
May 8, 20232 min read


Performing a DPIA
A Data Protection Impact Assessment is a process used to identify and assess the potential risks associated with the use of personal data
May 1, 20232 min read


Responding to a DSAR
Data Subject Access Requests are requests made by individuals for access to personal data that an organisation holds about them.
Apr 24, 20232 min read


Complying with Privacy Laws
Compliance with data protection laws can be a complex process, but there are steps that organisations can take to become and stay compliant.
Apr 17, 20233 min read


What is XDR?!
XDR is an approach that combines multiple technologies and data to provide a comprehensive view of an organisation's security posture.
Apr 10, 20232 min read


Why you should Classify your Data
Classifying data, and information, is an essential step for organisations to understand and protect their sensitive information.
Apr 3, 20233 min read


Defining a Security Operating Model
An operating model is a framework that outlines the processes and roles to maintain your security posture.
Mar 27, 20233 min read


Managing Privileged Users
PAM refers to the process of controlling and monitoring access to sensitive systems and data.
Mar 20, 20232 min read


Managing Third-Party Security Risk
Managing third-party security risk is critical for all businesses.
Mar 13, 20233 min read


Improving your Security Culture
People are both your first line of defence and your weakest link. Improving your security culture can dramatically improve your security
Mar 6, 20232 min read


Rehearsing your Incident Response
Practicing your response to a cyber incident ensures you remain effective during a real security incident.
Feb 27, 20231 min read


Defending against Ransomware
Ransomware is big business, for the threat actors, and a serious risk for businesses.
Feb 20, 20232 min read


What is Security Hygiene
Security hygiene refers to the basic practices that must be implemented to maintain your security posture.
Feb 13, 20232 min read


Responding to a Security Incident
These steps for responding to a security incident can help manage risks and impacts.
Feb 6, 20232 min read


Cyber Security in 2023
We are not going to refer to these as “Predictions” for cyber security in 2023.
Jan 30, 20232 min read


Reducing the Attack Surface
Weaknesses will exist within your technical estate, that’s an unavoidable fact.
Jan 27, 20232 min read


Assessing your Cyber Maturity
Assessing your current cyber security maturity will help identify gaps and prioritise areas for improvement.
Jan 25, 20232 min read
bottom of page