LATEST NEWS

Kai Neophytou Kai Neophytou

The NIS2 Framework is here: What is it? Do you need it? And how will it improve your cyber posture?

The NIS2 Framework represents a critical evolution in the European Union’s cyber security legislation, expanding the scope and rigor of the original NIS Directive. Set to be enforced from October 17, 2024, NIS2 imposes stringent security requirements on a broad range of essential and important organizations, including sectors such as energy, finance, health, and digital infrastructure.

Read More
Kai Neophytou Kai Neophytou

Cyber Security Awareness Month - Why is it important to keep your “Cyber Hygiene” in check?

Cyber Security Awareness Month serves as a crucial platform for educating organisations and their employees about the persistent and evolving risks posed by cyber threats. As organisations often become preoccupied with identifying new cyber challenges, foundational security practices can inadvertently become neglected, leading to vulnerabilities that cybercriminals can exploit…

Read More
Guest User Guest User

Cyber Security Posture: What exactly is “cyber security posture” and 5 ways you can fix it

Acronyms and buzzwords often feel hard to escape in cyber security, but ‘posture’ is one that you don’t want to dismiss. The term ‘cyber security posture’ refers to the overall security status of an organisation’s network and information systems. Think of it like your business’s immune system – ready to defend against potential cyber attacks and keep everything healthily ticking along.

Read More
Guest User Guest User

The AI Effect: Rising Cyber Risks in Manufacturing

The Fourth Industrial Revolution, or ‘Industry 4.0’, has transformed how goods are designed, manufactured, and distributed. AI advancements enhance connectivity, productivity, and adaptability across industries but also introduce complex vulnerabilities.

Read More
Guest User Guest User

Strengthening Supply Chain Security: Insights and Best Practices

In our interconnected digital landscape, supply chain cyber-attacks are a significant and growing threat. Targeting links between various entities and exploiting vulnerabilities to infiltrate and disrupt systems. By compromising suppliers, attackers can access multiple organisations, bypassing direct security measures that individual organisations may deploy.

Read More
Ceri Maund Ceri Maund

Sports & Stadium Cyber Security: Implications of Martyn’s Law

Sports grounds and stadiums are increasingly being used as multi-use venues and with complex technological interconnected systems which widen the threat landscape and heighten cyber risk. The introduction of Martyn’s Law brings physcical security and cyber security to the forefront for organisations.

Here we delve deeper into the cyber security implications of Martyn’s Law - More

Read More
Guest User Guest User

Managing Cyber Risk in Charities

Digitalisation is an integral element to today’s organisational operations, the threat posed by cybercriminals has also increased. Charities, like any other organisation, face a myriad of cyber threats ranging from phishing attacks to ransomware.

Read More