The digital age has massively increased the amount of data organisations use for day-to-day business, which has triggered a sharp rise in Data Breach and Data Loss incidents. Protecting sensitive data has never been more essential to business operations, and…Read more
Blogs
Unlocking Data Resilience: A short guide to Data Loss Prevention & Azure Purview
Protecting Your Digital Fortress: A Short Guide to Blue Teaming
When the world of cyber security is split into primary colours, ‘Blue’ is on the defence. In the dynamic world of cyber security, companies face a never-ending battle against an expansive array of cyber threats. A proactive defence strategy know…Read more
The True Value of Penetration Tests
“We use Anti-Malware software, why would we ever need a penetration test?” Unfortunately, this is a sentence that we hear all too often. As specialists in the cyber security industry, it can be easy to forget that most people, through…Read more
ISO 27001:2022 – Implementation Pitfalls!
When working to establish an Information Security Management System in line with the requirements of the ISO 27001 standard it is easy to think that the main challenge would be writing all the policies and procedures and implementing all the…Read more
Small Budget, Big Protection: Top 5 Low-Cost Cyber Security Measures for Businesses
Fortify your Business without Breaking the Bank. Cyber Security can often seem like a daunting subject, with countless areas of an organisation to consider, alongside significant upfront and ongoing investment. Our aim is to provide clear and pragmatic advice at…Read more
Cyber Essentials 2023 – The arrival of Montpellier!
Cyber security is an essential aspect of any business today. With the rise of digital technologies and the widespread use of the internet, businesses are exposed to various cyber threats that can harm their operations, reputation, and customers. Cyber Essentials…Read more
KB – Cyber Essentials Plus Mobile Device Screenshots
When being assessed for Cyber Essentials Plus, a subset of mobile devices will be selected to ensure they are running supported versions & trusted certificates. Please provide the applicable screenshots for the selected devices, as demonstrated below. Android Screenshots To…Read more
KB – Microsoft 365 Allow List
You should allow-list the IP Address and Domains listed in your introduction email, to ensure that your training and simulated phishing emails are delivered to your users correctly. In Microsoft 365, this can be done using the Security Portal. Please let…Read more