Get in Touch Close Menu
AWS Buckets: There’s a Hole in my Bucket – Securing your Data in the Cloud 
6 September 2022

In 2021, AWS S3 accounted for roughly 60% of breaches.  

Like most data breaches, the AWS bucket incident resulted from an incorrectly configured bucket which exposed 36GB of data to the public. The information leaked included mortgage and customer demographics. 

find out more
Threat Intelligence on Recent Cyberattack by CL0P Ransomware Group   
24 August 2022

The CL0P ransomware group claimed responsibility for the attack on UK-based utility provider South Staffordshire Water. However, they have said there is no impact on the water supply or drinking water safety. 

On its extortion website, CL0P uploaded a vast collection of stolen papers. These included passport scans, spreadsheets with administrator passwords, drivers’ licences, and, concerningly, screenshots of administration interfaces of wastewater treatment systems.  

Find out more
Build a Business Case for a MSSP
18 August 2022

There are two options for organisations to manage and protect to their systems from threats.

The first is in-house security management. An in-house option is one where you have a dedicated team or person responsible for managing your cybersecurity. Ordinarily, in-house staff would be led by a Head of IT or Chief Information Security Officer (CISO) (or similar).

The other option is outsourcing your cybersecurity as a managed service. 

Find out more
Five Ways to Reduce your Cyber Exposure 
1 August 2022

Improving your cybersecurity to reduce cyber exposure is an ongoing process.

Recent data suggests that there is a cyberattack every 39 seconds. Therefore, an organisation-wide cybersecurity plan is critical to tackling the constantly changing modern threat landscape. This article will discuss the five steps you can take to reduce your cyber exposure.

Find out more
How to reduce security alert fatigue
27 July 2022

Alerting is essential to cybersecurity.  However, alerting can also be an overwhelming aspect of cybersecurity. A never-ending set of alerts that require investigating can cause alert overload. So how do you reduce security alert fatigue? An effective Managed Security Information and Events Management (SIEM) system, paired with the skill set of a 24/7 Security Operations […]

Find out more
Building a Zero-Trust Strategy   
30 June 2022

In the past, security professionals relied on traditional perimeter security such as firewalls to prevent unwanted access to their data; however, this has become progressively irrelevant in today’s modern landscape due the adoption of cloud first strategies and flexible working approach which in turn has blurred the line as to where that perimeter actually exists. 

The pandemic and cloud-first technologies have expedited this move to an extended perimeter which has driven cybersecurity professionals to prioritise a Zero-Trust strategy throughout many organisations. 

Find out more
What does a SOC analyst do?
31 May 2022

SOCs (Security Operations Centre) are cross-functional, which helps centralise operations carried out by different departments within an organisation. This means that they provide value to organisation stakeholders and help meet agendas. 

SOC analysts play a critical role in taking responsibility for security incidents and assisting in communications on security incidents.  

Find out more
Sapphire Gains Five Star Partner Status with Check Point
13 May 2022

With over two decades of mitigating cyber risk across people, processes, and technology, Sapphire supports its customers through its expertise, quality, and skill by employing a progressive set of cybersecurity services from in-house and partner-provided solutions.  

Find out more
How Do Managed EDR Solutions Work?
5 May 2022

Increasing the scale of your cybersecurity is not easy. After all, cybersecurity is not just about prevention. With cyber-attacks part of our world, organisations must be prepared to respond effectively to threat actors. One such way of preparing and responding is through endpoint detection and response (EDR) and or Managed EDR solutions. Organisations use EDR […]

Find out more
What is the SOC (Security Operations Centre) Visibility Triad?
19 April 2022

IT environments are becoming increasingly complex and sophisticated, and security teams are faced with the daunting task of keeping potential attackers from accessing their organisation’s environments. As a result, organisations are adopting increasingly complex cybersecurity solutions to combat this growing concern. One way to do this is by using the SOC visibility triad.

Find out more
The Future of Ransomware: 2022 & Beyond
11 April 2022

Ransomware remains one of the highest priority challenges for organisations of all sizes and across all sectors in 2022.

“Ransomware is the fastest-growing cybercrime for a reason,” says Steve Morgan, founder at Cybersecurity Ventures and editor-in-chief at Cybercrime Magazine. “It’s the proverbial get-rich-quick scheme in the minds of hackers.”

Find out more
Harmony: Check Point & Avanan
24 March 2022

Most companies have moved away from traditional in-house on-premises hosted applications like file servers, mail servers and proxy servers for cloud-based services known as Software-as-a-Service (SaaS) applications. One of the most popular SaaS platforms I have come across is Microsoft 365 Exchange Online. The cloud-based mail platform is accessible from anywhere offers no end of features, constantly evolving to meet organisational needs. Microsoft integrates its security and mail filtering capabilities into this platform.

Find out more