Cyber insurance, commonly referred to as cyber-liability insurance, is a type of insurance that aids in shielding organisations from the repercussions of hacking and cyberattacks. Cyber insurance can minimise the organisation disruption caused by a cyber incident and its aftermath with the help of cyber insurance policy coverage. It can also potentially cover some of the associated costs.find out more
To support its continued growth, a Fintech organisation wanted to show prospective clients evidence of its security maturity while protecting its infrastructure and achieving regulatory compliance with the Financial Conduct Authority (FCA).Find out more
Security awareness training objective is to ensure that employees understand the role they can play in helping to enhance and enforce the organisations’ security. From understanding data protection requirements to being able to spot the telltale signs of a phishing email, your employees are your first and foremost defence against a security breach.Find out more
‘What are the differences between these three types of detection and response?’ Unlike legacy security tools, network detection and response don’t rely on signature-based security tools. They often can’t detect new cyber attacks unless these signatures have already been recognised as cyber attacks on a network. However, NDR works to monitor and analyse networks via built-in response capabilities.Find out more
The ability to detect and respond to threats quickly and effectively is crucial for maintaining the health and security of the hardware, networks and software maintaining the confidentiality, integrity and availability of enterprise, data and software assets in your business.Find out more
Several high-profile organisations, including Cisco Talos, Microsoft, and Uber, have been breached by threat actors who have successfully utilised this technique. Whilst MFA plays a significant part in strengthening an organisation’s cybersecurity posture, it is not a ‘silver bullet’.Find out more
With the rapid changes in how organisations work driven by external factors such as COVID-19 and rapid demands placed on IT teams, the potential for vulnerabilities to occur has increased. This has raised the associated risk of becoming a victim of high-impact cyber-attacks.Find out more
In 2021, AWS S3 accounted for roughly 60% of breaches.
Like most data breaches, the AWS bucket incident resulted from an incorrectly configured bucket which exposed 36GB of data to the public. The information leaked included mortgage and customer demographics.Find out more
The CL0P ransomware group claimed responsibility for the attack on UK-based utility provider South Staffordshire Water. However, they have said there is no impact on the water supply or drinking water safety.
On its extortion website, CL0P uploaded a vast collection of stolen papers. These included passport scans, spreadsheets with administrator passwords, drivers’ licences, and, concerningly, screenshots of administration interfaces of wastewater treatment systems.Find out more
There are two options for organisations to manage and protect to their systems from threats.
The first is in-house security management. An in-house option is one where you have a dedicated team or person responsible for managing your cybersecurity. Ordinarily, in-house staff would be led by a Head of IT or Chief Information Security Officer (CISO) (or similar).
The other option is outsourcing your cybersecurity as a managed service.Find out more
Improving your cybersecurity to reduce cyber exposure is an ongoing process.
Recent data suggests that there is a cyberattack every 39 seconds. Therefore, an organisation-wide cybersecurity plan is critical to tackling the constantly changing modern threat landscape. This article will discuss the five steps you can take to reduce your cyber exposure.Find out more
Alerting is essential to cybersecurity. However, alerting can also be an overwhelming aspect of cybersecurity. A never-ending set of alerts that require investigating can cause alert overload. So how do you reduce security alert fatigue? An effective Managed Security Information and Events Management (SIEM) system, paired with the skill set of a 24/7 Security Operations […]Find out more