Please consider updating your browser. Some parts of the website may not function as intended.

What are the Benefits of a vCISO

There is no doubt that the number of qualified and available to hire cyber security experts is decreasing. A study by the Center of Cyber Safety and Education identified that there may be close to 100,000 unfilled UK cyber security jobs by 2022. With this staggering statistic, it’s no wonder why many organisations battle to […]

Critical Bug Hacking into IoT Devices

hacking into iot devices

Security experts are sending out a high alert on a critical vulnerability that heavily affected tons of devices used worldwide that are connected to the ThroughTek’s Kalay IoT cloud platform. The Impact The vulnerability impacts products from different companies that produce reconnaissance and video solutions that include home computerised IoT frameworks, which utilise the Kalay […]

“Fly Trap” Cyber Attackers Target Home Routers

cyber attackers target home routers

Three days after the revelation, cyber attackers are commandeering home routers from 20 vendors along with ISPs. The security blemish, followed as CVE-2021-20090, was revealed last week by specialists at Tenable. It influences gadgets from 20 unique sellers and ISPs (ADB, Arcadyan, ASMAX, ASUS, Beeline, British Telecom, Buffalo, Deutsche Telekom, HughesNet, KPN, O2, Orange, Skinny, […]

Protecting Your Organisation After a Ransomware Attack

ransomware attack

So, here is the scenario: you’re sitting at your desk working away and suddenly realise an attacker has taken over your screen. The threat actor is now demanding a hefty payment in exchange to release access to the system. You immediately report the incident to the Chief Information Officer and wait nervously to see what […]

12 Critical Policies for SOC 2 Compliance

Policies for SOC 2 Compliance

If you are considering getting your organisation SOC 2 compliant, this blog should be an eye-opener. Obtaining SOC 2 compliance could be quite a time challenge in terms of preparation, process and finances. Many achievements come with obstacles, but SOC 2 does not have to be difficult if you plan well. It will be well […]

Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott

As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr Emma Philpott, the Director and CEO of the IASME Consortium Ltd, answers intriguing questions and provides enlightening responses from her point of view in a recent webinar with Risk Crew. Give yourself a moment out of your day & enrich […]

Join Us At The Big CISO 360 Event


Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th anniversary of the CISO 360 Congress. And guess what, it’s NOT VIRTUAL but Hybrid.💃 We, Risk Crew will be sponsoring this event and we are looking forward to meeting you in person at Victorian Gothic Mansion House Oakley Court, Windsor, […]

SOC 2 Type 2: How to Prepare for the Audit Webinar

soc 2 type 2

Risk Crew announces part 2 of the SOC-IT-2-ME series, SOC 2 Type 2: How to Prepare for the Audit Webinar. Let us give you an insight into our upcoming webinar. Established by the American Institute of Certified Public Accountants, SOC 2 defines a governance framework for managing sensitive customer information based on 5 Trust Service […]

Ransomware Readiness Audit Service

Ransomware readiness audit

Ransomware is affecting increasing numbers of organisations, causing the UK to be the second most attacked country globally (in 2020) for ransomware attacks. Which is costing UK businesses a total of £365 million for the year. It’s a huge figure. What can you do to reduce that figure? The answer to that question is, protect […]

Conducting DPIAs: The Key to Unlocking Data Protection Compliance Webinar

Why else should you attend the webinar? You’ll not only receive expert insight into triggers and mistakes to avoid but will have the opportunity to ask your pressing questions surrounding the DPIA tool – which is the key to DPA and GDPR compliance. What else will be covered on DPIAs?   The 4 objectives for […]

Risk Crew