Please consider updating your browser. Some parts of the website may not function as intended.

How a Ransomware Readiness Assessment Can Help Your Business Stay Safe

prepare for ransomware

Ransomware is a type of malware that encrypts files and then seeks payment in exchange for the encryption key.  A ransomware readiness assessment is an audit that businesses can undergo to determine their risk level for ransomware. The assessment will help you identify which areas of your organisation are at the highest risk for attack […]

Get ISO 27001 Tips to Jump the Hurdles of Compliance


When looking to embark on achieving ISO 27001 Compliance, every organisation should know what challenges are ahead, in order to overcome them. It doesn’t have to be that hard if you know the hurdles. Risk Crew would like to share some tips to jump the hurdles when it comes to building your Information Security Management […]

ISO 27001 Checklist: The Documentation Required

Man with lots of documents on his desk

Documenting your information security management system (ISMS) for evidence of compliance with the ISO 27001:2013 standard can be confusing as it is not clear which documents are mandated and which are discretionary. Consequently, most of us overcompensate and produce far more paperwork than we need causing redundant and conflicting policies to confuse our stakeholders, staff […]

What are the Different Types of Penetration Testing?

Penetration Testing on a computer screen

If you’re considering a penetration test to identify and fix vulnerabilities within your business, you might not know which type of pen test is best for you. In this article, we explore the types of penetration testing available, and what they are best for. What are the Different Types of Penetration Testing? Risk Crew offers […]

Red Team Vs Blue Team – What’s the Difference?

Information security risk assessment

With the ever-increasing threat of data breaches for many organisations, testing your security systems is the only way to find vulnerabilities. When discussing cyber security tests, the terms “Red Team” and “Blue Team” are often mentioned. In this article, we will cover what the two teams are, their roles and how they work together to […]

How Do You Conduct an Information Security Risk Assessment?

Two men conducting an information security risk assessment

Information security risk assessments are crucial for any businesses that deal with any sensitive information that could potentially cause harm if accessed, shared, modified, or deleted. In this article, we cover how your business can benefit from a security risk assessment, how they are conducted, and how you can use the assessment findings to improve […]

10 Social Engineering Attacks You Need to Know

social engineering attacks

Simply put — social engineering works. Ask any Threat Actor in the business. Social engineering was behind more than 95% of the attacks reported last year by Purplesec. Consequently, educating your staff on what it is and how to spot it is nothing less than critical. Here are the top 10 most common types of […]

Nestlé Operating in Russia Causes Data Breach

Nestlé Operating in Russia

Another war was launched by a popular anonymous hacktivist on companies who still choose to run in Russia and pay taxes to the Russian Government. After Nestlé decided to continue operating in Russia the anonymous hackers threatened to attack them and eventually hacked into their system, leaking 10GB worth of sensitive data. Impact On 22nd […]

Risk Crew