Search the blog:
As increasing numbers of businesses have moved to a cloud environment and remote working models, Zero Trust has gained a place in the everyday cyber security approaches of many organisations.
Most people within your organisation will use at least one web browser. They are ubiquitous. Some will use them to access essential business apps. Some will be using them to access webmail accounts. Others will use them simply to browse the Internet. Yet web browsers are amongst the most insecure...
We hear a lot about the need to back up your important business data and business applications. However, there’s an equally important backup you need to be making. The Grant McGregor team explains.
The threat from state-sponsored criminal cyber activity has grown rapidly as global tensions have escalated in recent years. Espionage activity is heavily focused on disruptive actions and financial gains. High risk sectors and companies of all sizes are targeted because of the data or intellectual...
Malicious cyber activity can take many guises. One attack vector that the UK’s National Cyber Security Centre warns against is a watering hole attack. But what is a watering hole attack? And how can you protect your organisation from them?
As we continue to track the impact of the data breaches at UK outsourcing firm Capita, workers at some of the UK’s largest companies are being warned that their personal data has been compromised. What can we learn from this latest data breach?
How many times a day do you respond to an email without really thinking about its contents?
When you replace old computers or external drives, do you delete data and then just… get rid of them? You could be putting your sensitive data at risk.
As one of the UK’s leading providers of business process outsourcing services, Capita’s cyber security practices should be second to none. Yet the events of this year have strikingly illustrated how supply chain security cannot be taken for granted.