Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses, many have...

Why Your Business Is More Susceptible to Attack Over the Festive Season

Why Your Business Is More Susceptible to Attack Over the Festive Season   Often, the festive season sees a good majority of...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.” – James...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years since experts...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a process that...

PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity

PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called Working in...

Podcast | The Myriad of Detection and Response Acronyms

The Myriad of Detection and Response Acronyms   Right now, there’s a lot of buzz in the security industry around detection and response...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of communication, meeting...

The 5 Critical Challenges Affecting Data Protection Officers

The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an organisation’s structure,...

The Cyber Attack Stages Explained | Board Edition

The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages of a...

Building On Your Cyber Security Posture In The Construction Industry

Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the world. Every...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’ for many...