top of page
Articles
Some light reading on cyber security, data protection and resilience


Welcome to Cyber Security Awareness Month
Today marks the start of Cyber Security Awareness Month, a month dedicated to helping individuals understand more about the risks they face.
Oct 1, 20242 min read


Cyber Awareness Month
Wondering what to do for Cyber Awareness Month? OR no idea what or when Cyber Awareness Month is?
Then download our FREE Guide
Sep 12, 20241 min read


Charting Your Course: A Guide to Planning Your Cyber Security Program
In today's hyperconnected world, having an effective cyber security program is not optional - it is essential. Cyber security breaches...
Jun 13, 20243 min read


CIS: What is "Reasonable Security"
The Center for Internet Security (CIS) has published its view on what "Reasonable Security" means.
May 29, 20243 min read


Be Cyber Self-Aware: Benefits of a Cyber Security Posture Review
A Cyber Security Posture Review (CSPR) acts as a security health check for your organisation, analysing your current security maturity
May 21, 20243 min read


Cyber 101: Security Hygiene
A significant proportion of cyber attacks are seemingly avoidable, should security hygiene have been in place.
May 7, 20244 min read


Navigating the Storm: Effective Communication During a Cyberattack
Whilst effective preventative and detective security controls are essential, a well-defined communication plan is essential
Apr 29, 20242 min read


Don't Believe the Hype: Cybersecurity misconceptions
Cybersecurity can seem like a complex & expensive subject, but the truth is, there are many misconceptions that leave businesses vulnerable.
Apr 22, 20243 min read


The Guardians: A Look Inside a Cybersecurity Team
Organisations need to build a robust team to ensure they can manage and mitigate cyber risk.
Apr 15, 20243 min read


Shielding Your Inbox: Building a Robust Response to Business Email Compromise (BEC)
Business Email Compromise (BEC) continue to impact businesses of all sizes, exploiting human trust to siphon funds or steal sensitive data.
Apr 9, 20242 min read


Artificial Intelligence: a Double-Edged Sword
The cyber security landscape has always evolved rapidly; However, this is now fuelled by the ever-expanding use of artificial...
Feb 14, 20242 min read


The Dark Side of AI
Artificial intelligence (AI) is rapidly transforming our world, with every facet of our lives being impacted in some way. While AI...
Feb 14, 20242 min read


AI: A Force for Good
While malicious actors wield the potential of artificial intelligence (AI) to launch ever-more sophisticated attacks, AI is increasingly...
Feb 14, 20242 min read


Should your business get Certified
Obtaining industry certifications like Cyber Essentials, ISO27001 or SOC 2 (Type 2) can bring significant benefits to an organisation.
Jan 29, 20243 min read


A guide to strengthening your organisation’s Security Culture
A guide to strengthening your organisation’s Security Culture
Jul 15, 20238 min read


You got the CISO role, now what?
CISO's have a lot on their plate. There are some key areas they need to focus on.
Jun 26, 20232 min read


Security Metrics
There are a variety of metrics that organisations can use to measure their cyber security posture.
May 29, 20232 min read


Communicating with the Board
it is important for the Board to have a clear understanding of the organisation's cyber security posture and risk management strategies
May 22, 20232 min read


Business Continuity Planning
Business Continuity Planning is the process of creating plans that outline the steps required to continue operations during disruption
May 15, 20232 min read


What is a RoPA?
Record of Processing Activities is a requirement of data protection laws that organisations must record all their processing activities
May 8, 20232 min read


Performing a DPIA
A Data Protection Impact Assessment is a process used to identify and assess the potential risks associated with the use of personal data
May 1, 20232 min read


Responding to a DSAR
Data Subject Access Requests are requests made by individuals for access to personal data that an organisation holds about them.
Apr 24, 20232 min read


Complying with Privacy Laws
Compliance with data protection laws can be a complex process, but there are steps that organisations can take to become and stay compliant.
Apr 17, 20233 min read


What is XDR?!
XDR is an approach that combines multiple technologies and data to provide a comprehensive view of an organisation's security posture.
Apr 10, 20232 min read
bottom of page
