Please consider updating your browser. Some parts of the website may not function as intended.

How Much Does An ISO 27001 Certification Cost?

How much does an ISO 27001 certification cost?

One of the major obstacles for an organisation to achieve ISO 27001 Certification can be with fitting it within their budget. It can seem like a daunting task to gather all the variables that are needed to estimate an ISO 27001 certification cost. So how can you get a ballpark estimate for certification when there […]

Top 5 Signs of Social Engineering Attacks

how to protect against social engineering attacks

Can social engineering attacks be detected? Social engineering attacks usually have signs that can be spotted if you know what they are. However, since there are different types of social engineering attacks, it can be harder to know when to look for them. In short, any time information is exchanged in some form of communication, […]

Secure Your SME to Detour Hacker Attacks

SME Hacker Attacks

It is estimated that six in ten SMEs that suffer a breach are likely to go out of business within six months. With COVID-19 having a huge impact on profitability this year, no business can easily recover financially from a cyber attack. Cyber security is essential to the business’s risk management programme regardless of size. […]

Data Protection Steps Required as the Brexit Transition Ends

Brexit Data Protection

After 30th December 2020, the Brexit transition period will end. This has implications for the transfer of personally identifiable information (PII) out of the EU/EEA to the UK. To get around this the UK plans to reach an adequacy agreement with the EU so that things can continue pretty much as they are. By incorporating […]

6 Good Reasons to Get Cyber Liability Insurance

Cyber Security Insurance

This is a guest article written by Stewart Ruffles. The author’s views are entirely his own and do not necessarily reflect the views of Risk Crew. Enjoy! Technology is a must for many businesses — but it comes at a risk. The extent to which businesses rely on technology varies. Some may manage a modestly […]

Top 8 Metrics to Collect During Red Team Testing

Why should we collect metrics in a red team test? Metrics are a valuable way of measuring changes and improvements over time. A red team test is conducted to assess the controls and lack of controls in place to stop an attacker achieving certain goals. By using metrics during red team testing, you can observe […]

What to Include in Your Security Testing Supplier’s Agreement

A successful penetration test requires good preparation with an airtight service-level contract between the customer and a supplier that helps both to achieve the ultimate goal: security. Listed in this post are some important items to include in the contract. These are by no means a full and comprehensive list but should serve to help […]

Cyber Security After COVID-19: How to Protect Your Business

Cyber security after covid-19

What is cyber security after COVID-19? We have now passed the stage of emergency policies and procedures being implemented, new technology being procured outside a normal tender and we have determined our businesses tasks that cannot be performed remotely since they require strict supervision. There were a few hiccups, lessons learned, but we are there […]

Top Security Breaches that have Zoomed into 2020 Thus Far

We have all seen how fast things can change in 2020 but the one thing that has not changed is the number of security breaches. In fact, the coronavirus increased the security threat landscape. One reason for this increase is due to the working from home (WFH) environment created more vulnerabilities and avenues for attacks. […]

Do NOT follow this link or you will be banned from the site!