Please consider updating your browser. Some parts of the website may not function as intended.

SaaS Security – The Essentials

saas security

Software companies have naturally embraced the cloud. It provides countless benefits for their clients, ranging from the lack of installation or maintenance of on-premises solutions to the ease of scalability. However, with benefits come risks as it provides Threat Actors with a single, centralised internet-facing target. Consequently, security becomes paramount. If you are a SaaS […]

Critical Bug Hacking into IoT Devices

hacking into iot devices

Security experts are sending out a high alert on a critical vulnerability that heavily affected tons of devices used worldwide that are connected to the ThroughTek’s Kalay IoT cloud platform. The Impact The vulnerability impacts products from different companies that produce reconnaissance and video solutions that include home computerised IoT frameworks, which utilise the Kalay […]

“Fly Trap” Cyber Attackers Target Home Routers

cyber attackers target home routers

Three days after the revelation, cyber attackers are commandeering home routers from 20 vendors along with ISPs. The security blemish, followed as CVE-2021-20090, was revealed last week by specialists at Tenable. It influences gadgets from 20 unique sellers and ISPs (ADB, Arcadyan, ASMAX, ASUS, Beeline, British Telecom, Buffalo, Deutsche Telekom, HughesNet, KPN, O2, Orange, Skinny, […]

Protecting Your Organisation After a Ransomware Attack

ransomware attack

So, here is the scenario: you’re sitting at your desk working away and suddenly realise an attacker has taken over your screen. The threat actor is now demanding a hefty payment in exchange to release access to the system. You immediately report the incident to the Chief Information Officer and wait nervously to see what […]

Best Antivirus Software. Are You Sure?

Best Antivirus Software

If only it were as simple as the popular ‘XYZ’ Antivirus (AV) software solution is the best antivirus software and outperforms all the rest. But, unfortunately, sometimes marketing can be deceiving. As expected, popularity and quality do not go hand in hand with most AVs. As a result, there has been poor progress in AV […]

12 Critical Policies for SOC 2 Compliance

Policies for SOC 2 Compliance

If you are considering getting your organisation SOC 2 compliant, this blog should be an eye-opener. Obtaining SOC 2 compliance could be quite a time challenge in terms of preparation, process and finances. Many achievements come with obstacles, but SOC 2 does not have to be difficult if you plan well. It will be well […]

Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott

As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr Emma Philpott, the Director and CEO of the IASME Consortium Ltd, answers intriguing questions and provides enlightening responses from her point of view in a recent webinar with Risk Crew. Give yourself a moment out of your day & enrich […]

Join Us At The Big CISO 360 Event


Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th anniversary of the CISO 360 Congress. And guess what, it’s NOT VIRTUAL but Hybrid.💃 We, Risk Crew will be sponsoring this event and we are looking forward to meeting you in person at Victorian Gothic Mansion House Oakley Court, Windsor, […]

SOC 2 Type 2: How to Prepare for the Audit Webinar

soc 2 type 2

Risk Crew announces part 2 of the SOC-IT-2-ME series, SOC 2 Type 2: How to Prepare for the Audit Webinar. Let us give you an insight into our upcoming webinar. Established by the American Institute of Certified Public Accountants, SOC 2 defines a governance framework for managing sensitive customer information based on 5 Trust Service […]

Risk Crew