How Not To Hit The Headlines in 2026: What Recent Breaches Have Taught Us
What Recent Breaches Teach Leaders about Modern Cyber Risk
In 2025, we saw some of the most recognisable brands in the UK and beyond hit the headlines for all the wrong reasons.
Cyber attacks cost the British economy billions each year and the impact is felt far beyond the organisations that fall victim. When a major business is disrupted, the ripple effects reach suppliers, partners, and entire sectors of the economy.
In a recent webinar, Sales Director Adam Myers was joined by CTO Ryan Bradbury to unpack four major breaches – Marks and Spencer, Co-op, Jaguar Land Rover and Oracle – and what they reveal about the evolving threat landscape.
For IT leaders, CISOs and boards, the lessons are clear; cyber security resilience in 2026 is not just about the right tools; it is about removing blind spots, strengthening human behaviour, and maintaining continuous visibility.
When Trust Assumptions Break, Attackers Walk Straight in
Across all four incidents, one shared truth stood out. Attackers are not only trying to force their way through hardened perimeters, they are also exploiting small gaps in identity, communication, and process.
Rather than relying on malware or brute force, threat actors impersonated employees, targeted pressured help desk teams, and leveraged stolen credentials. These tactics work because they exploit human behaviour and the real-world pressures teams face.
For leaders, this reinforces the importance of a cyber security culture where teams feel confident to pause, challenge and verify – and where processes are stress tested, not just documented.
1. Marks and Spencer: Social Engineering at Scale
Generative AI is changing the game. Is it helping defenders more than attackers? Dive into the risks, opportunities, and real-world impact of AI on cyber security.
Dave Mareels, Senior Director of Product Management at Sophos, joins the podcast to explore how generative AI is reshaping the cyber threat landscape.
2. AI and Human Defenders Working Together
The April 2025 M&S breach began with attackers impersonating employees to a third-party IT provider. Attackers acquired passwords through social engineering, bypassing normal checks, and enabling them to move laterally to access data before launching ransomware.
This incident highlights a reality many leaders recognise. Even with the right technical controls are in place, people under pressure can unintentionally override them. It is why traditional one-off training is no longer enough.
Organisations now need continuous security awareness programmes, realistic phishing simulations, and tabletop scenario testing to prepare teams for high-pressure decisions.
Cyber Security Tabletop Exercises

Turn incident response planning into a focused, hands‑on exercise.
Combine a posture assessment with phishing simulations, Live Hack demo, and a HackRisk.ai scan in an engaging tabletop session for your leadership team – followed by an executive‑ready report and action plan.
Not role‑play. Real data. Real insight.
2. Co–op: When a Pattern Becomes a Playbook
Just weeks later, Co-op faced a near identical social engineering breach. Attackers reused the same techniques because, simply, they work. This reflects a broader trend where criminal groups increasingly share successful approaches, leaked credentials and intelligence, creating an economy built on repetition.
For CISOs and leaders, this means resilience requires continuous reinforcement. Training cannot be quarterly. Help desk teams cannot rely solely on process. Identity verification cannot rest on assumptions that someone “sounds legitimate”.
The point is not to blame teams, but to support them with clear processes, role-specific training, and communication channels that make it easy to raise suspicions early.
3. Jaguar Land Rover: The Hidden Cost of Unknown Exposures
The major August 2025 breach at Jaguar Land Rover was triggered by stolen credentials and allowed attackers to cause a full production shutdown. The real issue wasn’t one single vulnerability, but a chain of exposures that went unnoticed.
Many organisations still lack full visibility of their internet facing assets or whether their credentials have already leaked. By the time a breach becomes visible, attackers may have been conducting reconnaissance for months.
This is where continuous attack surface monitoring, dark web intelligence and automated reconnaissance become essential. Annual assessments may provide a snapshot into security, but modern attackers exploit the other 364 days too.
4. Oracle: A Zero–Day that Exposed Global Organisations
October 2025 saw attackers exploit an unpatched zero-day vulnerability in Oracle’s eBusiness suite, affecting major organisations across the globe. This incident reinforces a tough truth; even highly mature organisations can be vulnerable when assets are not fully inventoried and internet facing systems are not continuously assessed.
For boards, this underlines the value of visibility as a strategic investment. You cannot protect what you cannot see.
What all these Breaches Have in Common
Across all four incidents, one theme appeared again and again; these breaches didn’t stem from a single technical failure. They were the result of gaps between people, process and technology.
Leaders should consider three strategic priorities:
- Strengthen human resilience
Modern attacks target behaviour as much as systems. Regular tabletop exercises, redteam engagements and realistic training programmes help teams think clearly under pressure. - Remove visibility blind spots
Unknown assets, exposed credentials and unmonitored suppliers are now among the most common root causes of major incidents. Visibility is no longer a technical function, but aboard level priority. - Treat cyber security as a continuous journey
Pointintime assessments are valuable, but insufficient. Continuous scanning, dark web monitoring, and real-time risk tracking help organisations act before attackers do.
Services like Sophos MDR provide expert-led 24/7 threat hunting, detection, and response capabilities to automatically block 99.98% of threats.
How HackRisk Supports Leadership Decision-Making
Our HackRisk platform is supporting leaders in building proactive security strategies.
Its six interconnected security modules are designed to provide the visibility and continuous oversight the modern threat landscape demands.
Together, these insights create a security picture leaders can confidently act on. It is the difference between reacting to incidents and preventing them.
Only 13 percent of UK businesses assess cyber risks within their immediate suppliers and just 8 percent assess their wider supply chain. Yet, as the Oracle case study shows, devastating breaches now originate through partners long considered low risk.
HackRisk’s Supply Chain Security tools allow organisations to invite suppliers, review their cyber posture, assess accreditations, issue onboarding questionnaires and even run financial credit checks, all in one place. For boards and CISOs, this brings clarity to an area traditionally full of fragmented data and manual chasing.
Final Thoughts for Leaders
As Ryan concluded:
“Organisations are not failing because they are ignoring cyber security. They are failing because they cannot see where it is quietly breaking”.
– Ryan Bradbury, CTO at CyberLab
Attackers are patient. They observe. They exploit moments where process meets pressure.
Your defences must do the same. Identify blind spots, strengthen your people, and invest in continuous visibility. These are the steps that prevent your organisation from becoming the next headline.
Get Your Free HackRisk Report
AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.
We’ll perform a full external scan and generate your first HackRisk Report, completely free of charge.
You will receive your HackRisk report within 24 hours. No card details necessary.
Securing the Logistics Sector from Cyber Threats: CSH Success Story
A CSH Transport Success Story
How CSH Transport Is Leading the Way in Cyber Resilience
As the logistics industry accelerates its digital transformation, the stakes for cyber security have never been higher. From real-time tracking systems to cloud-based warehousing and sensitive client data, third-party logistics (3PL) providers are increasingly reliant on digital infrastructure to deliver seamless, efficient services. But with this reliance comes risk -and the need for robust, proactive cyber defences.
One company that’s setting the standard is CSH Transport and Forwarding Ltd, a UK-based logistics specialist with over 40 years of experience. Operating from key locations in Blackburn and the Port of Goole, CSH is known for its reliability and expertise in dry freight, liquid bulk, hazardous and non-hazardous chemical distribution, and secure warehousing.
The Cyber Threat Landscape for Logistics
The logistics sector is a prime target for cyber criminals – and the risks are growing more complex by the day.
With increasing reliance on digital systems for fleet tracking, warehousing, and client communications, logistics providers face a unique blend of vulnerabilities. Disruption to transport systems, data breaches involving sensitive contracts or hazardous materials, and ransomware attacks on operational platforms can have far-reaching consequences – not just for the business, but for the entire supply chain.
For CSH Transport, the challenge was clear: protect their Microsoft 365 environment, ensure compliance, and build a cyber security posture that could evolve with the threat landscape. But they didn’t just need a vendor – they needed a partner.
CyberLab delivered more than just tools and technology. They provided a wraparound support model that combined proactive monitoring, strategic guidance, and hands-on expertise. From securing endpoints and hardening Microsoft 365 to guiding CSH through Cyber Essentials certification, CyberLab helped CSH build a cyber security foundation that was not only resilient, but scalable.
This partnership gave CSH the confidence to operate securely in a high-risk sector, knowing they had the visibility, control, and expert support to stay ahead of evolving threats.

A Strategic Partnership for Resilience
CSH turned to CyberLab for a comprehensive, layered security solution. The partnership focused on two key pillars:
- Microsoft 365 Security Support – CyberLab provided continuous monitoring, patching, and proactive threat detection across CSH’s M365 environment. This ensured vulnerabilities were addressed swiftly and systems remained secure.
- Cyber Essentials Certification – CyberLab guided CSH through the certification process, helping them implement essential controls and demonstrate their commitment to cyber hygiene and compliance.
This dual approach not only protected CSH’s systems but also reinforced trust with clients and partners – an increasingly important differentiator in a competitive market.
Visibility, Control, and Confidence
With CyberLab’s support, CSH Transport gained far more than just a cyber security solution – they gained a strategic partner committed to their long-term resilience.
CyberLab provided CSH with real-time visibility into their Microsoft 365 environment through automated reporting and threat monitoring, ensuring that potential risks were identified and addressed before they could escalate. This transparency gave CSH the confidence to make informed decisions about their security posture.
But visibility was just the beginning. CyberLab’s quarterly advisory sessions offered CSH a structured opportunity to review their security landscape, assess emerging threats, and plan proactive improvements. These sessions weren’t just check-ins – they were collaborative strategy reviews, tailored to CSH’s evolving operational needs.
What truly set CyberLab apart was the wraparound security support: a dedicated team of cyber security experts on hand to provide guidance, answer questions, and respond rapidly to incidents. Whether it was navigating compliance requirements like Cyber Essentials or fine-tuning their Microsoft 365 configurations, CSH knew they had a trusted partner in their corner.
This combination of insight, strategic advice, and hands-on support empowered CSH to move forward with confidence – knowing their operations were protected, their team was supported, and their cyber resilience was continuously improving.
“Working with CyberLab has been a seamless and highly effective experience. Their expertise in securing our Microsoft 365 environment and guiding us through Cyber Essentials certification has significantly strengthened our overall security posture. The proactive monitoring and responsive support have given us the confidence to focus on delivering exceptional services to our customers, knowing that our systems are protected by a trusted partner.”
– Chris Haworth, IT Manager, CSH Transport & Forwarding
Lessons for the Industry
CSH’s journey offers a blueprint for other logistics providers navigating the cyber threat landscape:
- Cyber security is not a one-off project – it’s an ongoing strategy.
- Certification frameworks like Cyber Essentials are more than checkboxes – they’re trust signals.
- Partnering with experts can accelerate resilience and free internal teams to focus on core operations.
As the logistics sector continues to digitise, companies like CSH are proving that operational excellence and cyber resilience go hand in hand.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
Strengthening Cyber Resilience in Fashion AI Technology
A Delvify Success Story
Digital innovation is transforming every industry, and fashion is no exception. Delvify, a UK-headquartered fashion-tech company, is leading the charge – leveraging AI to help brands and suppliers collaborate more sustainably.
But as the company scaled its operations across Singapore, Hong Kong, and Japan, it faced a growing challenge: how to protect sensitive data in an increasingly hostile cyber threat landscape. According to the Sophos State of Ransomware 2025 report, 50% of ransomware attacks resulted in data encryption – down from 70% the previous year, but still a significant risk for organisations handling sensitive data.
“CyberLab’s team thoroughly and efficiently supported us in bringing best practice to our security processes. With a consultative approach, they guided us to modify and improve our existing processes to make Delvify a more robust and more secure organisation.”
– Charles Allard, Founder of Delvify
The Cyber Threat Landscape for Fashion Tech
Fashion-tech companies like Delvify sit at the intersection of creativity, data, and global collaboration. Their platforms are built to be agile, decentralised, and fast-moving – qualities that are essential for innovation but can also introduce significant cyber risk.
Remote-first teams, diverse operating systems, and a reliance on cloud-based collaboration tools mean that the attack surface is constantly shifting. Cyber criminals are increasingly targeting organisations that handle large volumes of sensitive data, and the fashion sector is no exception. The consequences of a breach extend far beyond financial loss; they can disrupt supply chains, erode brand reputation, and undermine the trust that partners and customers place in digital platforms.
The Sophos State of Ransomware 2025 report highlights that exploited vulnerabilities remain the most common technical root cause of ransomware attacks, accounting for 32% of incidents. For fashion-tech businesses, this means that even a single overlooked weakness can have cascading effects across global operations. As Delvify expanded its reach, the leadership team recognised that proactive cyber security was not just a technical requirement – it was a strategic imperative for long-term growth and resilience.

Why Cyber Essentials Was the Right Fit
Delvify recognised that cyber security couldn’t be an afterthought – it had to be embedded into the company’s DNA. That’s why they turned to CyberLab, an IASME-approved assessor, to guide them through the Cyber Essentials certification process.
Cyber Essentials is a UK government-backed standard that helps organisations protect themselves against the most common cyber threats. For Delvify, it offered a clear, structured framework to assess and improve their security posture – without slowing down their pace of innovation.
The certification process provided Delvify with a roadmap for strengthening its defences, covering everything from firewalls and secure configuration to user access control, malware protection, and patch management. CyberLab’s expertise ensured that every step was tailored to Delvify’s unique environment, addressing the specific risks associated with remote work, device diversity, and rapid product development.
By aligning with Cyber Essentials, Delvify was able to demonstrate its commitment to best practices, reassure stakeholders, and position itself as a trusted partner in the fashion-tech ecosystem.
A Tailored Approach to a Complex Environment
CyberLab’s consultative approach began with a deep dive into Delvify’s existing security practices. From there, the team provided tailored guidance to address platform-specific risks, implement best practices, and align controls with Cyber Essentials requirements.
This wasn’t a one-size-fits-all engagement. CyberLab worked closely with Delvify to ensure that security improvements supported the company’s operational agility. From device management and access control to patching and malware protection, every recommendation was designed to strengthen resilience without compromising flexibility.
The partnership was characterised by open communication and a shared commitment to continuous improvement. CyberLab helped Delvify identify gaps in its defences, prioritise remediation efforts, and foster a culture of accountability across technical and operational teams.
The result was a security posture that not only met regulatory requirements but also empowered Delvify to innovate with confidence, knowing that its data and systems were protected against emerging threats.
“We run different operating systems on a variety of machines including Linux on MacBooks, as well as our proprietary AI platform. CyberLab was able to identify threats and suggest appropriate fixes to secure our remote teams.”
– Aleksei Bochkov, Chief Engineer at Delvify
More Than a Certificate: A Cultural Shift
Achieving Cyber Essentials certification was a milestone, but for Delvify, it was just the beginning. The process sparked a broader cultural shift within the organisation, encouraging cross-functional collaboration and a shared sense of accountability for cyber resilience.
Security controls were not only implemented, they were embedded into daily operations. Teams became more aware of cyber risks, more proactive in addressing them, and more aligned in their commitment to protecting the company’s data, clients, and reputation.
This cultural transformation extended beyond the IT department, reaching every corner of the business. Employees at all levels were engaged in cyber security training, incident response planning, and ongoing risk assessments.
The certification journey fostered a spirit of collaboration, transparency, and shared responsibility, ensuring that cyber resilience became a core value rather than a checkbox exercise. As Delvify continues to grow, this foundation will support both compliance and innovation, enabling the company to adapt to new challenges and opportunities with agility and confidence.
Final Thoughts
Delvify’s journey with CyberLab demonstrates how proactive cyber security isn’t just about compliance, it’s about building a foundation for trust, innovation, and sustainable growth.
By embedding best practices and achieving Cyber Essentials certification, Delvify has strengthened its resilience, enhanced its credibility with partners, and empowered its teams to collaborate securely across borders.
In a digital economy where threats are constantly evolving, Delvify’s commitment to cyber security sets a new standard for the fashion-tech sector, proving that resilience and agility can go hand in hand.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
CyberLab Announces Strategic Partnership with Vicarius: Automated Patching
New Partnership to Enable Customers to Detect, Manage, & Remediate Vulnerabilities
CyberLab announce a new partnership with Vicarius, combining CyberLab’s expertise in cyber security with Vicarius’ leading AI vulnerability remediation to provide UK businesses with enhanced vulnerability management.
In CyberLab’s experience, managing an increasing number of vulnerabilities presents a notable challenge for many organisations. Addressing this, the necessity for a method that effectively sorts and promptly resolves these issues is paramount, with delays often leading to significant negative repercussions. Vicarius’s technology is designed to address this gap by bringing together various platforms into a cohesive system. This strategy demonstrates a proactive stance in vulnerability management, offering potential enhancements in security posture and efficiency for businesses grappling with these challenges.
“Orchestration and delivery of effective patch management isn’t new, but it has never been straight-forward to get it completely right and the explosion of remote and mobile working has only added to the challenges.
Vicarius’s vRx not only provides effective patch management for Windows and MacOS via a single console, but offers almost complete coverage of those smaller apps that frequently get forgotten about and won’t automatically update.”
– Gavin Wood, CEO at CyberLab

Vicarius’s vRx platform seamlessly integrates vulnerability discovery, prioritisation, and remediation. By automating the entire vulnerability management lifecycle, vRx empowers security and IT teams to improve efficiency and mitigate risks more effectively.
For example, vRx’s Patchless Protection feature keeps high-risk apps safe even when a patch isn’t available. Vulnerable applications are shielded within a force field and secured until the next patch has been prepared, tested, and deployed.
“To align with such a high quality partner in the UK is very exciting for Vicarius.
CyberLab are cyber experts from both a resale and MSSP perspective. Their technical expertise and market knowledge is second to none. We are truly delighted to announce this partnership.”
– Moty Cohen, Head of EMEA at Vicarius

CyberLab works in close partnership with their clients to understand the complex threats they come up against and mitigate risks, they view their collaboration with Vicarius as an opportunity to introduce their clients to an innovative technology in order to bolster their clients’ abilities to combat evolving cyber threats and ensure compliance with cybersecurity standards, including Cyber Essentials and Cyber Essentials Plus.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
The New NCSC Cyber Governance Code of Practice for UK Boards
What The Guidance Means for UK Boards
On 8 April 2025, the UK Government released a draft Cyber Governance Code of Practice – designed to help boards and directors better understand and manage their cyber security responsibilities.
Developed jointly by the Department for Science, Innovation and Technology (DSIT) and the National Cyber Security Centre (NCSC), the Code offers a clear and accessible framework for leadership teams to embed cyber resilience at the heart of their organisations.
What is the Cyber Governance Code of Practice?
The Code outlines five key principles for cyber governance:
-
Risk Management – Integrating cyber risk into overall business risk management.
-
Cyber Strategy – Setting direction and allocating appropriate resources.
-
People – Defining roles and responsibilities across the business.
-
Incident Planning – Being ready to respond and recover effectively.
-
Assurance & Oversight – Regularly reviewing controls and seeking external assurance.
In essence, the Code encourages boards to approach cyber risk with the same level of leadership and accountability as financial, legal, or operational risks.
These outcomes are intended to support informed decision-making, reduce risk, and ensure that cyber security is considered across business planning, operations, and investment.
Rather than being a checklist or compliance task, this is about building a resilient culture where cyber security becomes part of everyday governance.
Supporting Directors in an Evolving Threat Landscape
Cyber security is no longer just a technical concern — it’s a business-critical issue that boards need to lead from the top. This new Code encourages decision-makers to take a strategic, long-term view of cyber risk.
It’s especially aimed at non-cyber specialists, providing guidance in plain language to help directors ask the right questions, set priorities, and ensure the right structures are in place.
Why Adopting the Code is Beneficial for Boards
With cyber threats constantly evolving, adopting the Cyber Governance Code helps boards stay ahead by integrating cyber resilience into their organisation’s culture.
By following the Code, businesses not only prepare for emerging regulatory changes but also show a clear commitment to safeguarding their operations. This proactive approach can help build trust with stakeholders, enhance organisational resilience, and support long-term success.
Embracing the Code encourages boards to take a confident, informed stance on cyber risk, fostering a culture where cyber security is seen as a shared responsibility across the organisation.
How CyberLab Can Help
One of the clearest starting points for aligning with the Code is Cyber Essentials.
This government-backed certification helps organisations put in place key technical defences and prove they take cyber seriously. It’s also a powerful way to demonstrate board-level commitment to cyber risk, particularly under the Code’s principles of assurance and oversight. At CyberLab, we guide organisations through both Cyber Essentials and Cyber Essentials Plus certifications with expert support every step of the way.
Beyond Cyber Essentials, we also offer a range of services that support the broader aims of the Code:
- Penetration Testing & Assurance
Test the real-world resilience of your organisation. We deliver regular, detailed assessments to meet both internal and regulatory requirements. - Policy, Strategy & Board-Level Support
Need help aligning with the Code? Our consultants support with governance frameworks, risk registers, incident planning, and more. - Supply Chain & Third-Party Risk Reviews
Understand the risks introduced by suppliers and service providers – a growing concern under the new guidance.
Our team at CyberLab is here to help your organisation build a robust cyber governance framework, ensuring you’re not only compliant but also resilient against the evolving cyber threat landscape.
Aligning with NCSC Guidance: Our Posture Assessment
To help organisations effectively assess and improve their cyber governance, CyberLab offers a Posture Assessment service grounded in the NCSC’s Top 10 Cyber Security guidance. This assessment is designed to evaluate your organisation’s current cyber security practices, identifying areas of strength and opportunities for improvement.
By aligning with the NCSC’s recognised framework, our Posture Assessment provides clear, actionable recommendations that enable organisations to adopt best practices for risk management, incident response, and overall cyber resilience.
It’s a strategic tool that empowers boards to take proactive steps in securing their organisation while supporting compliance with emerging cyber governance standards.
Final Thoughts
The new Cyber Governance Code of Practice marks a significant step forward, emphasising that cyber governance is an essential responsibility for boards.
Rather than simply delegating cyber security, senior leaders are encouraged to actively engage, understand the risks, allocate resources, and foster a culture of resilience across the organisation.
If you need guidance on aligning with the new Code, CyberLab is here to support you.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
Cyber Essentials Willow Update 2025: Everything You Need To Know
What You Need to Know
The latest Cyber Essentials update, ‘Willow’, was released in May 2025, marking a significant evolution in the UK government’s flagship cyber security certification scheme. Replacing the ‘Montpellier’ question set, Willow reflects updated guidance from the National Cyber Security Centre (NCSC) and responds to emerging threats that businesses face today.
Whether you’re renewing your certification or applying for the first time, here’s a clear breakdown of what’s changed – and what your business needs to do next.
Key Changes in the 2025 Willow Update
The Willow update builds on the previous Montpellier release, revising definitions, terminology, and processes to keep Cyber Essentials aligned with current cyber security best practice.
Some of the headline changes include:
1. Expanded Scope: Firmware is Now In-Scope
The term ‘software’ now explicitly includes firmware, such as that found on firewalls and routers. This means organisations must ensure these critical systems are updated regularly — and are no longer exempt from compliance checks.
Why it matters: Unpatched firmware is increasingly targeted by attackers and often overlooked in patch management strategies.
2. Mandatory Asset Management Practices
Organisations must now maintain an accurate, up-to-date inventory of all devices and software within scope. This includes:
-
Company-issued and personal (BYOD) devices
-
Cloud services
-
Networking equipment
-
Installed applications
Why it matters: Asset visibility is a fundamental control for identifying vulnerabilities and reducing risk.
3. Tighter Controls for BYOD (Bring Your Own Device)
“Plugins” have been replaced with “frameworks and extensions,” a change that aligns terminology with modern software development and deployment.
4. Cloud Services: MFA Now Mandatory
The update introduces stricter rules for personal devices used for work, referencing the latest NCSC guidance. Organisations must:
-
Define clear BYOD policies
-
Enforce controls like device encryption and screen locks
-
Ensure staff understand their responsibilities
Why it matters: Personal devices are often a weak link, especially in remote or hybrid environments.
What’s Changed in Cyber Essentials?
1. Vulnerability Fixes
The term “high and critical patches” has been replaced with “vulnerability fixes.” This now includes a broader range of remediation actions such as scripts, registry edits, or vendor-prescribed methods. Any vulnerability with a CVSS score of 7.0 or higher (based on CVSS v3.1) must now be addressed.
2. Remote Working Terminology
“Home Workers” has been updated to “Home working and remote working” to better reflect the variety of modern work arrangements.
3. Supported Software
The term “plugins” has been replaced with “frameworks and extensions” to align with current software structures.
4. Passwordless Authentication
Now permitted in specific scenarios, including access to firewall configurations, externally hosted services, and internal infrastructure. Accepted methods include biometrics, physical devices, one-time codes, QR codes, and push notifications.
What’s Changed in Cyber Essentials Plus?
1. Technical Scope Verification
Auditors must now technically verify the scope of in-scope assets, including servers, end-user devices, mobile devices, and networks. Any excluded networks must also be verified.
2. Asset Sampling Notification
Applicants will be notified of the sampled assets three working days before the audit – but not earlier. This ensures a fair and unbiased selection process.
3. Admin Device Sampling
If applicable, an admin user’s device must be included in the audit sample.
What Your Business Needs to Do
Whether you’re looking to achieve certification for the first time or renew under Willow, you’ll need to ensure that your policies, tools, and documentation reflect these new expectations.
Here’s how to stay compliant:
✅ Review the full Willow requirements on the NCSC website.
✅ Audit and update your asset management processes.
✅ Apply firmware patching to all in-scope devices.
✅ Enforce MFA across all cloud platforms, for all users.
✅ Review and formalise your BYOD policies and training.
Need Help Navigating the Willow Update?
As an IASME-approved certification body, CyberLab has already helped hundreds of organisations achieve Cyber Essentials and Cyber Essentials Plus — and we’re ready to guide you through the Willow update too.
Whether it’s a full audit or a quick compliance health check, we can support you every step of the way.
Contact us today to get started with Willow.
What is Penetration Testing? Everything You Need To Know About Security Testing
Everything You Need To Know
Penetration Testing, or a Pen Test, is a security test that launches a mock cyber attack to find vulnerabilities in a computer system.
A pen test is a way to identify vulnerabilities before attackers do, evaluate how effectively you can respond to security threats, assess your compliance with security policies, and improve the level of security awareness amongst your staff.
Penetration testers are security specialists trained in ethical hacking, using hacking methods and tools to identify and fix vulnerabilities rather than exploit them maliciously. Organisations purchase pen testing services to carry out simulated attacks on their applications, networks, and other systems. These controlled attacks enable security teams to discover serious weaknesses and strengthen their overall security defences.
While “ethical hacking” and “penetration testing” are sometimes used interchangeably, there is a subtle distinction. Ethical hacking is a broader discipline within cyber security that encompasses any application of hacking expertise to bolster security. Penetration testing, or pen testing, is one specific approach within ethical hacking, focusing on attack simulations. Ethical hackers may also offer malware analysis, risk evaluations, and other security-enhancing services.
Types of Penetration Testing
Penetration Testing
A Penetration Test aims to exploit the vulnerabilities of an organisation’s cybersecurity arrangements before a malicious party does. It uses a combination of automatic and manual techniques to identify issues within the infrastructure, systems and operations.
Vulnerability Assessment
Vulnerability Assessments are most often used by organisations when they want to identify the vulnerabilities present in their infrastructure and to get a high-level overview of their security posture. It involves an external approach and is fully automated.
Vulnerability Assessments are useful for companies who do not have visibility or understanding of their security posture. A vulnerability assessment can often be used as the first stage of a larger penetration testing project.
For organisations with legacy infrastructure, it is a quick, cost-effective way to identify and focus on software versions and systems that can be fixed easily.
External Penetration Test
An external penetration test replicates a real-life attack, searching for vulnerabilities that can be exploited by a hacker. This type of analysis aims to target everything Internet-facing. The penetration tester will focus on identifying network vulnerabilities. This can include issues with network services and hosts, devices, web, mail and FTP servers.
Objective Examples: Obtaining internal access to the network
Internal Penetration Test
An internal penetration test aims to identify and exploit internal vulnerabilities. Vulnerabilities can range from misconfigurations through to unpatched software and social engineering. The approach would be similar to an external penetration test, and the process followed would be the same.
Often the aim of this test can be unique to each client. A customer’s objective could be to gain access to a sensitive file or the domain controller with full admin rights, to elevate privileges or to perform an overall security assessment.
This type of test is only possible with access to the internal network either provided by the customer or gained by dropping a device like a dropbox or Raspberry PI onto any open network port, or by exploiting a compromised system i.e. emails.
Objective Examples: Leveraging internal access to obtain access to important assets on the network
Web Application Penetration Test
The web application penetration test aims to find weaknesses in applications programmed in-house or out of the box solutions, as well as ill-coded websites.
Web Apps are often vulnerable to many types of attacks that are often possible through the exploitation of misconfigurations in server builds or through bad coding practices. Vulnerabilities are often identified within functions where user input is received, like website search, address fields, file uploads, where SQL queries can be passed to gain access to back end databases. If either of those functionalists are not appropriately secured an attacker could exploit them to upload a malicious document that can create a back door giving a user unauthorised access to the underlying server it is running on.
Due to the world wide web being publicly exposed many websites and online stores come under constant attack. Identifying these vulnerabilities before anyone else can allows remediation actions to take place to secure the web app.
Examples: Brute-force attack, Error handling, SQL Injection and XSS.
Social Engineering
Social engineering is manipulating people into leaking sensitive information and providing an external malicious agent with unwarranted access to a network or building. It exploits the gaps in cyber security education in organisations and employs psychological persuasion.
The pen tester will research different aspects of the company and its people, refer to social media and current events, to gain the trust of the host and blend in with the organisation. However, social engineering is not limited to physical infiltration, but can also involve the use of email, social media and calls.
Performing such a test can reveal the gaps in cybersecurity awareness of the organisation’s people and stress the importance of employee training.
Examples: Phishing campaigns, traditional scamming techniques such as authority figure impersonation.
Red Team Engagement
A red team engagement is the more advanced version of a penetration test appropriate for companies with mature, well-established security arrangements. Compared to a pen test, they tend to take longer and often require multiple testers. The main objective is not to find and exploit all vulnerabilities, but instead, it is a targeted attack with a single objective aiming to be completely unnoticeable. Such tests are performed in scenarios where there is an immediate Blue team (Response Team) to stop a Red team (Attackers) in their tracks.
Black-Box Testing
In black-box testing, a tester doesn’t have any information about the internal working of the software system. It is a high-level assessment that focuses on the behaviour of the software. It involves testing from an external or end-user perspective. Black-box testing can be applied to virtually every level of software testing: unit, integration, system, and acceptance.
White-Box Testing
White-box testing is a testing technique which checks the internal functioning of the system. In this method, testing is based on coverage of code statements, branches, paths or conditions. White-box testing is considered as low-level testing. The white-box testing method assumes that the path of the logic in a unit or program is known.
Penetration Testing
Leave it to our team of expert penetration testers to identify vulnerabilities in your environment.
Our tailored assessments can cover every aspect of network security from general vulnerability identification to fully exploiting vulnerable web applications.
Cyber Security for Small and Medium-Sized Enterprises (SME's)
Five Cyber Security Essentials Every SME Needs in 2025
In today’s digital-first economy, SMEs face increasing cyber risks – from phishing and ransomware to insider threats and misconfigured systems.
With 43% of UK businesses reporting cyber incidents in the past year and SMEs accounting for over £3.4 billion in losses annually, robust cyber security is no longer optional – it’s essential for survival.
While achieving “cyber security nirvana” may be unrealistic, SMEs can build layered defences that offer confidence and resilience against evolving threats.
Tales from the CyberLab: Cyber Crime for SME’s Explained
The Five Essentials for SME Cyber Security
1. Next-Generation Endpoint Protection
Traditional antivirus tools are no longer sufficient. SMEs should invest in modern endpoint protection that uses behavioural analysis to detect threats—even those not yet catalogued. These solutions monitor suspicious activity and respond in real time, offering proactive defence against ransomware and malware.
2. Patching and Vulnerability Management
Unpatched software remains one of the most exploited attack vectors. With Cyber Essentials v3.2 now requiring patches within 14 days for high-severity vulnerabilities, SMEs must implement automated patching and maintain visibility across their IT estate.
3. Security Awareness Training
Human error is a leading cause of breaches. Regular training helps employees spot phishing attempts, use strong passwords, and follow secure practices. Simulated phishing campaigns and interactive modules can dramatically reduce risk.
4. Modern Firewalls
Next-generation firewalls offer dynamic threat detection, application-aware filtering, and integration with endpoint tools. These systems adapt to changing network behaviours and reduce manual rule management, making them ideal for SMEs with limited IT resources.
5. Disaster Recovery Planning
A well-tested disaster recovery (DR) plan is critical. SMEs should identify business-critical systems, define recovery time objectives (RTOs), and choose appropriate backup technologies. Regular testing ensures that recovery procedures are effective and actionable when needed.
Bonus: Test Everything
Security tools are only effective if properly configured. SMEs should conduct regular penetration testing, phishing simulations, and DR drills to validate their defences and uncover gaps before attackers do.
Certification Matters
Cyber Essentials and Cyber Essentials Plus remain vital for SMEs seeking to demonstrate baseline security and win public sector contracts. The 2025 updates emphasise cloud security, BYOD coverage, and stricter patching timelines.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
What is a Cyber Security Posture Assessment? Understanding Your Risks
Everything You Need To Know To Benchmark Your Cyber Security Posture
A cyber security posture assessment is a structured review of how well an organisation prevents, detects and responds to cyber threats.
It benchmarks current controls and processes against recognised good practice, highlights gaps, and prioritises improvements so that effort and investment go where they deliver the greatest reduction in risk.
Understanding an organisation’s specific cyber risks is essential to building proportionate countermeasures. Without a clear view of risk, it is easy to overspend in some areas, underinvest in others, and leave critical weaknesses unaddressed.
“We cannot treat everything the same way we did in the past. Major disruption may be only one crisis away. We cannot control it, but we can evolve our thinking, philosophy, programme and architecture.”
– Gartner
Why Posture Matters
Threats and attack paths continue to expand
Adversaries exploit people, processes, technology and supply chains.
Regulatory and customer expectations are rising
Organisations are expected to safeguard data, demonstrate due diligence, and recover quickly from incidents.
Resources are finite
A posture assessment helps align budget and effort to the areas that reduce risk most effectively.
The NCSC 10 Steps to Cyber Security
The UK National Cyber Security Centre’s 10 Steps to Cyber Security provide a strong foundation that organisations can adopt and tailor:
- Risk Management
Establish governance, define risk appetite and make informed decisions about priorities. - Engagement and Training
Build security awareness, culture and capability across staff and leadership. - Asset Management
Know what you have, where it is, who owns it and how it is supported. - Architecture and Configuration
Secure by design, harden configurations and reduce attack surface. - Vulnerability Management
Identify, prioritise and remediate vulnerabilities on a continuous basis. - Identity and Access Management
Enforce least privilege, strong authentication and robust lifecycle controls. - Data Security
Classify, protect, back up and securely dispose of data. - Logging and Monitoring
Collect relevant logs, detect anomalies and respond quickly. - Incident Management
Prepare playbooks, test response and improve after every exercise or incident. - Supply Chain Security
Assess and manage risks introduced by suppliers and partners.
These steps represent best practice, although not every control applies equally to every organisation. Tailoring is key.
The CyberLab Guide to Cyber Security Posture Assessment
CyberLab translates the 10 Steps into an accessible, outcome‑focused approach that meets each customer where they are. Drawing on practical experience, the guide helps organisations:
- Clarify what cyber security means for their context and risk profile
- Focus attention on the areas that matter most
- Build a realistic strategy and roadmap that balances protection, detection and response
The aim is to create a robust, proportionate and achievable plan that strengthens posture today and adapts to tomorrow’s threats.
How it Works
- Online assessment
The posture assessment is completed online, ideally with a CyberLab representative to capture the richest context. It typically takes 45 to 60 minutes. - Immediate scorecard
On submission, an automated scorecard is emailed that indicates relative strengths and weaknesses across key domains. - Expert review and bespoke report
Where CyberLab is engaged, a cyber security specialist reviews the results and produces a tailored report that explains findings, prioritises risks and recommends pragmatic improvements. - Roadmap and next steps
CyberLab then walks through the report with stakeholders to agree a right‑sized roadmap, sequencing initiatives for maximum risk reduction and value.
Alongside cyber security expertise, CyberLab also supports modern IT and service provisioning. For organisations using platforms such as Microsoft 365, the assessment can highlight opportunities to harden configurations and realise more value from existing investments.
Six Benefits of a Cyber Security Posture Assessment
- Validate your current approach
Confirm whether controls are configured effectively and proportionately. If there are gaps or misconfigurations, identify them early with guidance from specialists. - Target improvements where they matter
See where you are strong and where improvement is needed. In some cases, consolidating tools or replacing one control can free budget to strengthen multiple weaker areas, producing a better overall posture. - Visualise your future state
Translate findings into a clear get‑well plan and roadmap. Define milestones, owners and measures of success so progress is visible and sustainable. - Gain peace of mind
No environment can be 100 percent secure. The assessment helps ensure the critical 99 percent is addressed, reducing uncertainty and improving resilience. - Mitigate risks from known weaknesses
Not every issue can be fixed immediately. Interim mitigations, compensating controls and monitoring can reduce exposure until full remediation is in place. - Justify investment with evidence
A tailored report provides the business rationale for change, helping stakeholders understand risk, cost and benefit so funding decisions are informed and timely.
Getting Started
- If your organisation would like support to assess and strengthen its cyber security posture, CyberLab can help. Contact the team to schedule an assessment and begin shaping a roadmap that fits your environment, budget and risk appetite.We are here to help protect organisations from cyber attacks and to make security practical, proportionate and effective.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
Sophos XG Series Hardware: End of Life Announcement and Key Dates
XG Series Hardware is at End-of-Life
Recently, Sophos have announced the XG Series Hardware is going end-of-life, and this also applies to SG Series appliances running Sophos Firewall OS.
Your Upgrade Options
Upgrade your firewall appliance and bolster your defences against active threats. Get even more value from your investment in Sophos Firewall with a new XGS Series hardware appliance. Sophos XGS hardware offers increased performance with the dual processor architecture and dedicated hardware FastPath, plus many other technology improvements.
Why Upgrade?
- No new software to learn.
- Limited downtime – restore from XG backup.
- Continually improving performance.
- More flexible connectivity options including 5G support on some Desktop models.
Take your protection to the next level with Sophos MDR. Adding MDR allows you to extend the automation and lateral movement prevention to trigger responses based upon intel from Sophos threat analysts. All without changing your firewall rules, giving you unmatched, real-time response to active threats.
Why Upgrade Your Service with CyberLab?
“CyberLab has been dedicated to securing organisations of all sizes across the UK, including public sector bodies, for over 20 years through its partnership with Sophos.
The CyberLab team of experts have the latest accreditations and vast experience in transitioning clients to advanced cyber products.
As the Sophos XG Series Hardware nears its end-of-life, we highly recommend CyberLab as your partner of choice for a smooth transition to a new solution.”
– Stuart Borgman, Sophos VP Sales Engineering
Not Ready to Upgrade? Explore Your Renewal Options
- Extending your XG Series subscriptions up to the EOL date gives you the maximum use out of your XG appliance investment.
- The renewal date for one-year subscriptions was March 31, 2024, but shorter terms are still available for purchase. Please note, subscription terms can be extended beyond the EOL date.
If you currently own a subscription that extends past the EOL date, please contact CyberLab to discuss your options.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.









