Search the blog:
In July, the UK’s national cyber security centre published the sixth edition of its Active Cyber Defence report, outlining some of the most significant cyber threats faced – and reported by – British businesses. What can we learn from its revelations?
Your staff have a key role to play when it comes to cyber security. This isn’t limited to helping them understand and recognise common attack vectors – it must also include encouraging them to report any suspicious cyber activity.
As increasing numbers of businesses have moved to a cloud environment and remote working models, Zero Trust has gained a place in the everyday cyber security approaches of many organisations.
Most people within your organisation will use at least one web browser. They are ubiquitous. Some will use them to access essential business apps. Some will be using them to access webmail accounts. Others will use them simply to browse the Internet. Yet web browsers are amongst the most insecure...
We hear a lot about the need to back up your important business data and business applications. However, there’s an equally important backup you need to be making. The Grant McGregor team explains.
The threat from state-sponsored criminal cyber activity has grown rapidly as global tensions have escalated in recent years. Espionage activity is heavily focused on disruptive actions and financial gains. High risk sectors and companies of all sizes are targeted because of the data or intellectual...
Malicious cyber activity can take many guises. One attack vector that the UK’s National Cyber Security Centre warns against is a watering hole attack. But what is a watering hole attack? And how can you protect your organisation from them?
As we continue to track the impact of the data breaches at UK outsourcing firm Capita, workers at some of the UK’s largest companies are being warned that their personal data has been compromised. What can we learn from this latest data breach?
How many times a day do you respond to an email without really thinking about its contents?