The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of communication, meeting new people, forming...

The 5 Critical Challenges Affecting Data Protection Officers

The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an organisation’s structure, often further complicating...

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a £98,000 fine by the Information Commissioner’s...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations about ransomware and the sophistication...

Cyber Essentials: Major Updates in 2022

Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In December 2021, IASME and the NCSC announced...

Threat Landscape: The Key Cyber Security Statistics from 2021

Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to reflect on the threat landscape...

Human Layer Security: How To Reduce Risk If Awareness Training Fails

Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is a key component to email...

Partner Updates, November 30, 2021
Cyber Essentials: Important Updates

Cyber Essentials: Important Updates We hosted a webinar regarding the recent IASME updates last month and multiple connections have asked for the recording since. Due...

The Cyber Attack Stages Explained | Board Edition

The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages of a cyber attack. Most...

Building On Your Cyber Security Posture In The Construction Industry

Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the world. Every single person has...

The Education Roadmap: Mature Your Cyber Security Strategy

The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further pressure on to improve their...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’ for many years. The reason...