Please consider updating your browser. Some parts of the website may not function as intended.

Cyber Essentials: The Changes

Whether you’re an existing Cyber Essentials or Cyber Essentials Plus certificate holder or not, you may be aware that the certification process is going through some changes – these are almost exclusively related to the accreditation process rather than the actual elements of the certification and framework – we’ll walk you through all of it. […]

Why Choose a CREST Accredited Pen Testing Company?

CREST Pen Testing

If you are looking to book your next penetration test and your prime consideration is getting the cheapest and quickest one available, simply because you need to tick a box, then this blog piece isn’t for you. If, on the other hand, your main concern is gaining a comprehensive picture of the security of your […]

Who’s Zoomin’ Who?

Zoom unsecure

Video conferencing has never been more popular, let’s have a look at the options and examine some of the security implications. Possibly you, like me may have been a bit disappointed to see that when it comes to video conferencing his taskforce, our Prime Minister simply used Zoom like many of the rest of us. […]

Beware the Coronavirus Phishing Attacks

Coronavirus Phishing

On top of everything else to contend with you also need to be especially vigilant to COVID-19 based phishing emails – we talked about phishing emails generally in a previous blog post “Why you should fear the spear” I’ll refrain from expressing fully the contempt that all decent thinking people must feel towards those wishing […]

Working from Home? Don’t Forget Information Security.

working remotely information security

So COVID-19 or the Corona Virus as it’s still commonly referred to is really beginning to bite now, our news media outlets are immersed in the subject 24/7 so I won’t burden you with yet more facts and figures. We won’t be trying to clumsily shoehorn a sales message into this piece. Instead, we thought […]

What can we learn from 2019 data breaches

2019 breaches

We thought we would start 2020 by looking backwards. Specifically looking back at the biggest data breaches of 2019, seeing how many records were breached, getting a broad understanding of the nature of the attacks and then looking forward to seeing how we can learn lessons and protect our data assets better in the future. […]

Risk Crew Wishes You a Breach Free 2020

Looking back to 2019 and forward to 2020 If our Principal Consultant, Richard Hollis, had his Google Location Services on this year (he hasn’t of course, he’s not that mad!) it would throw up an image similar to what it would look like if you gave a kitten a ball of wool and it started […]

As a nation, are we cyber security aware?

In the following blog post, we are going to shine a spotlight on the general cyber threat landscape in the UK, examine the most prevalent forms of attack and look at the detrimental implications these attacks have on organisations. After reading this post, we hope you’ll be able to see where your company figures in […]

The Information Security Paradox

a paradox with words inside that refer to information security terminology

Have you heard about the French Paradox? No? Across the pond, our French neighbours enjoy a diet full of rich and cheesy saturated fats, whilst simultaneously experiencing relatively lower levels of coronary heart disease. This goes against conventional medical convention that suggests higher levels of saturated fats in a diet should result in higher rates […]

Why you should deploy Simulated Social Engineering Testing against your workforce

Why you should deploy Simulated Social Engineering Testing against your workforce

Social Engineering can be summed up as ‘hacking the human’. Traditional malicious hacking attacks a digital instance of an organisation (i.e. website, network or system) and attempts to gain unauthorised access or cause harm by exploiting a vulnerability. Social engineering instead focuses on a person and attempts to exploit human frailties by coercing or tricking […]

Do NOT follow this link or you will be banned from the site!