Top 3 Infamous Security Breaches of 2021

Infamous security breaches article thumbnail - men in server room

As the end of 2021 and the start of a new year comes into sight, now is the perfect time to reflect upon how businesses have fared with their cyber security and how they have handled a security breach. It has been much reported, that this year has brought new challenges to businesses in the […]

Maintaining Cyber Security when transitioning to a remote workforce

transition to home work - article thumbnail

As organisations learn to adapt to the new normal, more of them are turning to remote working as a long-term solution to their daily operations.  Businesses all over the world have begun to see the raft of benefits of remote working; from the financial benefits of saving money on an office, and the mental benefits […]

Proactive Ransomware Protection! – Auditing OneDrive with Elasticsearch and Kibana

For those of you who haven’t followed our series on ransomware, previously we discussed how you could use OneDrive to backup and version control all that decentralised data users typically store on their laptops and desktops, and you can catch up here.  For large scale enterprise, this can be an important safeguard to prevent data […]

Ransomware – Recover better, faster!

In our last two articles on Ransomware we discussed what it was, the impact it can have on your business and some quick steps you can take to ready your business for a Ransomware attack.  Hopefully, these quick wins were of value and you are already much better prepared to fend off your next Ransomware […]

Be Ransomware Ready!

Are users ready? One of the most common infection vectors is via the end-user and phishing/vishing campaigns are getting more sophisticated every year.  You can utilise free training material from the NCSC to train your users and raise awareness.  What’s great about this service is it includes a user quiz and can be loaded into […]

Ransomware, What is it?

Ransomware is one of the most prevalent variants of cyber-attack, often delivering more impact and disruption to the victim than many other attacks. Ransomware has featured in the majority of headline-grabbing cyber-attacks, such as the recent attack against Garmin which brought them days of user-impacting downtime, a week of recovery and a capital loss of […]