What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a process that...

The 5 Critical Challenges Affecting Data Protection Officers

The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an organisation’s structure,...

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a £98,000 fine...

Cyber Essentials: Major Updates in 2022

Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In December 2021,...

Cyber Essentials: Important Updates

Cyber Essentials: Important Updates We hosted a webinar regarding the recent IASME updates last month and multiple connections have asked for the...

The Education Roadmap: Mature Your Cyber Security Strategy

The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further pressure on...

The Fundamentals: Cyber Essentials

The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme are simple,...