IKEA hit by reply-chain email attack

IKEA hit by reply-chain email attack IKEA is fighting the consequences of a cyber attack which started on its email platform, where an adversary used legitimate email addresses of employees to spread malicious attachments to other IKEA employees. The attacks … Read More

Blog - Vulnerability Assessment vs Pen Testing

Vulnerability Assessment versus Penetration Test

Vulnerability Assessment versus Penetration Test What’s the difference? Gavin Wood, CEO at CyberLab, explains the difference between Vulnerability Assessment and Penetration Testing and their applications. Vulnerability Assessments (VAs) are usually seen as a lesser service when compared to a Penetration … Read More

Penetration testing

Prevention v Cure: Introduction to Pen Testing

Prevention v Cure: Introduction to Pen Testing CyberLab CEO Gavin Wood explains what penetration testing is and why diagnosing vulnerabilities earlier can save you money.  What is Penetration Testing? Prevention v Cure? Before I answer that I think I will … Read More

Blog - Hybrid working

What is a Phishing Attack: Examples & Action Plans

What is a Phishing Attack: Examples & Action Plans In this article CyberLab CEO Gavin Wood covers:  Email, businesses depend on it, and regardless of whether you love it or hate it, it’s here to stay. Even with the seemingly … Read More

Blog - 5 tools to get things done

Dive into SME Cyber Security

Dive into SME Cyber Security A Deep Dive into Microsoft 365 E5 Dan Cooper, Security Consultant at CyberLab, reviews the integrated security Microsoft offers as part of their E5 licence and tells the story of one of our customers who … Read More

Blog: Defence in Depth

Defence in Depth – Is this still a valid approach to Information Security

Defence in Depth In this blog, CyberLab CEO Gavin Wood explains what defence in depth stands for and whether it’s a valid approach nowadays. He covers: Defence in Depth (DiD) – is this still a valid approach to Information Security? … Read More

Illustration balancing usability and functionality

Active Monitoring Keeps You Secure

Active Monitoring Keeps You Secure Gavin Wood, CEO at CyberLab, takes a trip down memory lane, summarising his years of experience in the industry and the new level of protection all organisations need. He covers: “There are only two types … Read More

Blog - Cloud security tips

Your Security Questions Answered

Your Security Questions Answered Top three questions every business and IT leader ask themselves Security is very much in the news, with a catastrophic attack on the Irish Health Service with an estimated £100m cost of remediation and significant disruption … Read More

Cyber Essentials April 2021 Update

Cyber Essentials April 2021 Update IASME have recently introduced a number of changes to the Cyber Essentials question set with a view to providing clarification on certain questions to help applicants better understand the requirements for Cyber Essentials. The new … Read More

Flubot: Warnings over major Android ‘Package Delivery’ Scam

Flubot: Warnings Over Major Android ‘Package Delivery’ Scam Experts have warned that a text-message scam infecting android phones is spreading across the UK. The message – which pretends to be from a package delivery firm, shown below, prompts users to … Read More