Get in Touch Close Menu
Types of Penetration Testing
29 December 2021

There are a variety of routes whereby a bad actor can gain unauthorised access to an organisation’s systems. They range from telephony solutions, modems, ISDN and DSL, to name a few. These systems are used for various business purposes, including; support for remote and home working by staff, dedicated connections with organisation partners and suppliers, access to public networks (e.g. Internet) and third-party networks.

find out more
What are Threat Actors?
25 October 2021

In the world of cybersecurity, the more you know about threat actors, the better placed you are to counteract and manage cyber threats and attacks. But what is a threat actor? We can define a threat actor as a person, group, or entity performing a cyber-attack designed to impact an organisation negatively.

Find out more
An Interview with Vernon Poole on Cyber Security Culture
18 October 2021

It’s an exciting concept and one that many people don’t grasp. All organisations today can potentially fall victim to a cyber-attack or cyber security outage, which can cause severe damage to its ability to operate and its infrastructure. It’s more than just cyber security awareness; it requires the whole workforce to know what the risk is and the processes that need to be followed to avoid this risk.

Find out more
Cybersecurity Awareness Month UK 2021
4 October 2021

There have been many participants in Cybersecurity Awareness Month, such as DHS Secretary Janet Napolitano back in 2009. In 2010 during the STOP. THINK. CONNECT campaign, former U.S. President Barack Obama used this phrase as a national cybersecurity education and awareness message.

Cybersecurity Awareness Month has also had many themes to help articulate the different aspects of cybersecurity, such as education, cybercrime, law enforcement, mobility, critical infrastructure for any organisation from small to large.

Find out more
The importance of Incident Response
27 September 2021

While many threat and risk management solutions help organisations deal with low-level security events with automated responses, having an incident response plan, delivered by an experienced team will determine your success in responding to an attack.

Find out more
A Guide to Web Application Pen Testing | Sapphire
30 June 2021

Over the last year, the technological landscape has changed dramatically across the globe. More businesses than ever are investing in large and robust infrastructures, but the unfortunate truth is severe, and high-level cybersecurity weaknesses are more common today in 2021 than in 2020.

Find out more
How to Secure a Website – 8 Tips for Success | Sapphire
10 June 2021

Frequently, websites have outdated software containing known security vulnerabilities this is a security risk that can be avoided. Carrying out regular software updates and ensuring that you are using the latest version of the software will typically remediate these issues by installing security patches and increasing your website security.

Find out more