Hybrid Warfare and Cyber Attacks

Hybrid Warfare and Cyber Attacks in Modern Conflict and Global Security

What Organisations Must Know in 2025

Steve Clarke, Head of Penetration Testing at CyberLab, explores the evolving threat landscape shaped by hybrid warfare and cyber attacks, with a focus on the conflict in Ukraine and its global implications.

This blog covers:

  • The Conflict in Ukraine and Cyber Warfare
  • Information Warfare and Disinformation
  • Malware Spillage Beyond Borders
  • Russia Targeted by Anonymous
  • How to Protect Your Business and Data
  • How to Book Your Free Security Consultation


The Conflict in Ukraine and Cyber Warfare

Hybrid warfare – where conventional military tactics are combined with cyber attacks, disinformation, and sabotage – has become a defining feature of modern conflict.

Ukraine remains a frontline example, having faced relentless cyber aggression since 2014, including the infamous 2015 power grid attack and the 2017 NotPetya malware incident.

In 2022, Russia launched a full-scale invasion of Ukraine, preceded by cyber operations such as the deployment of HermeticWiper, designed to erase data and cripple systems. These attacks exploited endpoint and server misconfigurations, often executing with local admin privileges.

In 2025, Ukraine continues to face hybrid threats, including GPS jamming, drone interference, and coordinated disinformation campaigns. Despite this, experts praise Ukraine’s cyber defence strategy, which includes partnerships with big tech firms and international allies.


Information Warfare and Disinformation

Disinformation remains a core tactic in Russia’s hybrid playbook. From fake news to social media manipulation, these campaigns aim to destabilise societies and erode trust in institutions.

While large-scale cyber attacks on Western infrastructure have not materialised as feared, experts warn that Russia’s cyber capabilities are likely being recalibrated for future use.

Ukraine’s experience offers lessons: proactive communication, media literacy, and civil society engagement are key to countering narrative warfare.


Malware Spillage Beyond Borders

Hybrid cyber weapons often lack geographic constraints. Malware like NotPetya and AcidRain have caused global damage, affecting systems far beyond their intended targets.

With limited operational controls, these threats can persist for years, making patch management and system hardening essential.


Russia Targeted by Anonymous

Hacktivist group Anonymous has claimed responsibility for cyber operations against Russian state assets, including website defacements, TV broadcast takeovers, and data exfiltration.

These actions mark a shift from traditional DoS attacks to more targeted and symbolic disruptions.


How to Protect Your Business and Data

The UK’s National Cyber Security Centre (NCSC) continues to update its guidance for organisations of all sizes. Key recommendations include:

  • Patch Management: Ensure timely updates across all systems
  • Access Control: Use strong authentication and limit privileges
  • Monitoring: Implement logging and anomaly detection
  • Internet Footprint: Minimise exposure and harden public-facing assets
  • Human Factors: Train staff to report phishing and ensure offline backups are recoverable.

CyberLab supports over 28,000 organisations with tailored security solutions, helping businesses assess risk and strengthen their defences.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

CyberLab Deliver Attack Simulation

CyberLab Deliver an Attack Simulation In Front Of Cyber Crime Police

The CyberLab Team Delivered an Attack Simulation in Front of Over 30 Eastern Region Special Operations Unit (ERSOU) Officers

CyberLab’s penetration testing team of CREST, CHECK, and Cyber Scheme accredited engineers and Wayne Price, Commercial Director, delivered a live hack demonstration in front of ERSOU officers.

Over 30 attendees, a mix of Cyber Protect officers providing signposting and advice to individuals and organisations within the region and Cyber Pursue officers investigating cyber crime, joined the event to see how malicious agents can break into an organisation’s network in less than 5 minutes.

The CyberLab Penetration Testing Engineer, Alexandru Blanaru, showcased how an attacker can exploit multiple attack vectors to penetrate a network, escalate access, and breach valuable data. Together Wayne Price and Alex Blanaru covered the best cyber security practices organisations can adopt to protect their data.


“It is always great to collaborate with industry to ensure that, through shared learning, we remain at the forefront of protecting the region from cyber threats.

“The input from CyberLab helped our officers and investigators develop their skills around the complexities of different attack methodologies, and how they could be used by criminals.

“This, in turn, allowed further discussion about preventative measures, both technical and behavioural, to better inform our advice to the public.”

– John Greenwood, Cyber Protect Co-ordinator at ERSOU


Created in 2010, ERSOU operates across the seven police forces that make up the Eastern Region – Bedfordshire, Cambridgeshire, Essex, Hertfordshire, Kent, Norfolk and Suffolk.

It is made up of a Regional Organised Crime Unit (ROCU) and a Counter Terrorism Policing unit, which respectively manage the threat of serious and organised crime and terrorism across the region.

Working closely with local forces, external stakeholders and partners such as the NCA, the ROCU tackles and disrupts organised criminality such as drugs and firearms importation, cyber attacks, large-scale fraud, and much more.


“It was an honour to be invited to present in front of the Eastern Region Special Operations Unit, deliver the attack simulation and discuss the latest trends our team of engineers discover during their work in the field.

The cyber team at ERSOU are doing an amazing job operating in an incredibly complex and ever-evolving field and Dark Web”

– Wayne Price, Commercial Director at CyberLab


What is Penetration Testing?

Penetration Testing is a way to identify vulnerabilities before attackers do, evaluate how effectively companies can respond to security threats, assess compliance with security policies, and improve the level of security awareness among staff.

Using industry-standard methodologies, 15 of the UK’s top Penetration Test experts, our team of CREST, CHECK, and Cyber Scheme approved engineers undertake ethical attack simulations to uncover areas of concern in infrastructure, policies, and procedures.

The CyberLab team delivers attack simulations and educational sessions as part of customer and public engagements, as well as at events and industry conferences.


About CyberLab

CyberLab is a specialist cyber security company that provides a wide range of security solutions and services.

Your one-stop cyber security advisor, the CyberLab team is equipped with the right technology, knowledge, and expertise to help businesses of all sizes, including large public sector organisations.

By leveraging world-class technology, decades of experience, and their extensive vendor partnerships, CyberLab have helped to secure thousands of organisations across the UK.

Our unique Detect, Protect, Support approach makes us the perfect partner to review and reinforce your cyber security defences.

To contact the CyberLab Team, email [email protected].

About Eastern Region Special Operations Unit (ERSOU)

ERSOU’s ROCU leads the response to organised crime across the region.

Working closely with local forces, external stakeholders and partners such as the NCA, the ROCU tackles and disrupts organised criminality such as drugs and firearms importation, cyber attacks, large-scale fraud, and much more.

The team’s work has also been showcased several times on Channel 4’s 24 Hours in Police Custody.

To contact the ERSOU press office, email ERSOU Corporate Communications: [email protected].

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Secure Architecture & Configuration for Cyber Security

Secure Architecture & Configuration for Cyber Security

Design, Build, Maintain and Manage Systems Securely

Our host on the “10 Steps to Cyber Security” series outlines how organisations should use architecture and configuration to optimise cyber security.
They cover:
  • Understanding what you are building and why
  • Making systems that are easy to maintain and update
  • Making compromise and disruption difficult
  • Reducing the impact of compromise
  • Making it easy to detect and investigate compromises
  • Safely developing and managing systems

Adopting a secure architecture is an ideal most organisations aspire to. However, most companies have an existing environment that was architected years ago when the cyber security threat landscape didn’t vaguely resemble the threat landscape we have today. Tearing it all down and starting again is usually not an option, so what do you do?

Designing a systems architecture in line with the MITRE ATT&CK framework is a nice to have, but disrupting a business while you build, migrate and then UAT such an environment simply isn’t practical. Therefore, this blog post will touch upon the theoretical principles you would use to build such an environment if you were starting from scratch as well as include recommendations on how you can do your best to ensure that you are doing the basics right in your existing environment.


Understand What You Are Building and Why

Having a clear vision of the purpose that your environment will serve is key:

  • Will there be lots of externally facing or customer accessible elements for example?
  • Will the environment primarily be used to host DevOps people who will constantly be needing new VM’s spun up and down?
  • Will huge databases be hosted that support applications or interact with cloud resources?

Understand the level of risk that your organisation is willing to accept. Ensure there is an understanding that zero risk is possible, but the cost will be significant – work with your business to understand where the trade-off between acceptable risk and acceptable cost lies.

Ensure you have a concept of how long the system you are designing now is likely to be around for? Legacy systems can be a huge cyber risk. If OS versions will go end of life in 5 years – how will that be accommodated? This will be essential in ensuring that you are building system that is fit for purpose now and in the years to come.

Make Systems Easy to Maintain and Update

Maintenance and support is going to be necessary. Many organisations get stuck with systems that are out of date because they simply cannot take them down for any length of time. This means they are forced to implement other complex, costly solutions to protect the vulnerable areas.

Making it as easy as possible to get updates out and having the confidence that they have been successfully applied is key. You should only use supported OS versions. For anything that doesn’t have reliable automated updates, either use something else or find a methodology that works. For example, you may have to segment that device from everything else and patch it manually.

Patching – Hardware, Firmware, OS & Applications

Patching software vulnerabilities is one of the best ways to ensure your systems are secure. Not only does it remove software flaws, but it means that your organisation is more difficult to compromise. It may not be a deterrent to someone intent on gaining access, but it certainly will be for the opportunistic cyber criminals that are running automated botnets scanning for open ports or phishing email campaigns. If they can’t find an easy foothold, many will simply look elsewhere.

Change Management

Change management should be used to ensure stability of systems, verification of changes prior to implementation as well as providing a record of changes made should an incident occur.


Make Compromise & Disruption Difficult

Having a layered network architecture is a great idea but can be very complex to manage not to mention difficult and/or time-consuming to work with. But as we’re starting again then look at the MITRE ATT&CK framework, familiarise yourself with the tenets it conceptualises and adapt your design approach accordingly.  Ensuring that your network is compartmentalised. Then a compromise of a single area does not compromise the entire environment – the same approach to damage limitation/control the military uses. From a risk perspective it’s brilliant and it means you can segment the sensitive data away from any avenue of direct or indirect attack. 

Use anti-spoofing controls such as DMAC, SPF and DKIM to make it difficult to spoof your email domains, again, this will deter many threat actors or force them to use domains that are obviously fake and easier to spot. 

Web Content Filtering

Actively blocking access to types of unregulated websites protects your environment from the risks posed by embedded or hidden malware as well as users from potentially offensive, malicious or distressing content

Firewalls

Using firewalls has been a staple of IT environments for a very long time, there are still a lot of legacy-type firewalls in use that are not really suitable to combat todays cyber threats, use of next-gen firewalls is recommended if not already in use.

Reduce the Impact of Compromise

Organisations should make it difficult to laterally move from one area of the network to another. Compartmentalisation is arguably worthless of an attacker can still traverse the rest of the environment compromising as they go.

Using next-gen anti-malware to provide the highest levels of protection on your end-points such that should malware get to the end-point, it is detected and removed promptly before it can do damage.

Ensure you have good backup discipline, having a secure local backup repository can mean the difference between a restore operation taking days versus weeks to restore from cloud or off-site repositories. Virtual backup servers are a risk that organisations should avoid. If you lose the virtual environment, you lose your backup server as well. This means you will have to manually rebuild the hypervisor and the backup server to restore everything else.

Monitor for Indicators of Compromise

There are an increasing number of analysis tools available that will user heuristics, ML and AI to automatically monitor network traffic and correlate individually benign indicators of compromise to provide a clear picture of malicious activity and act before damage is done.

Use True Next-Gen Anti-Malware – Must Include AI-Based Detection

Using next-gen anti-malware to provide the highest levels of protection on your end-points such that should malware get to the end-point, it is detected and removed promptly before it can do damage.


Make It Easy to Detect and Investigate Compromises

Communication flows between different components can be particularly vulnerable to exploitation methods such as MITM attacks. Organisations should use tools such as encryption and network access control lists to protect against this and make any subversion attempts easier to spot.

Build a Methodology to Triage and Respond When There Is a Problem

The likelihood of a cyber incident occurring in any business is only going to increase as new threats emerge and the pace at which we work continues to increase. Mistakes will happen. Your incident response speed is vital to maintain high customer confidence.

The cost of cyber incidents is also largely underestimated by most organisations until they are faced with them. Hidden costs from regulatory fines, loss of reputation, legal fee’s from customers whose data has been compromised can all be very real problems.

Safely Develop and Manage Systems

Ensure clear demarcation between production and development systems. Have clearly defined software release processes to prevent untested development software being loaded onto production systems.

The number of remote workers is increasing and with that the variety of devices being connected to business systems. You need to have a clear understanding and control of the connected devices as well as how and where they are being connected. This is important to ensure the devices are legitimate and to protect against data exfiltration.

Control Applications in Use in the Environment

Application control ensures that users do not have the ability to use or install unauthorised software. Having rigorous application control in place with regular software audits can help identify software that should not be there and may be an indicator of compromise.


How CyberLab Can Help

CyberLab can provide consultancy and support on your key technology projects, help deliver business solutions, support your users in adopting them and provide managed or reactive support when your solution is up and running.

If you haven’t done so already, our Posture Assessment tool is a quick-and-easy way to identify your strengths and weaknesses, and get a better picture of your overall security posture.

We have put together a page of recommendations for improving your Architecture and Configuration, and which tools can help, which you can read here.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

What is Incident Management in Cyber Security

What Is Incident Management in Cyber Security and Why It Matters

Secure Your Organisation. Protect Your Data.

Our host outlines importance of incident management for effective cyber incident response and minimising the impact on an organisation.

He covers:

  • Understanding Incident Management
  • What Does Incident Management Mean
  • How to do Incident Management


What Does ‘Cyber Incident’ Mean?

The NCSC’s definition is…

“A breach of a system’s security policy in order to affect its integrity or availability and/or the unauthorised access or attempted access to a system or systems; in line with the Computer Misuse Act (1990).”

This definition covers number of potential scenarios – e.g. intentional or accidental data breaches, disruption of services due to DDoS, web application exploitation – it’s no longer just about how you fix a malware outbreak in the environment.


Understanding Incident Management

Incident management has historically been an aspect of Cyber Security that wasn’t considered until it’s too late primarily since it meant a malware outbreak. Today, with the instances of cyber incidents becoming increasingly frequent many organisations are developing Incident Management processes either because they have suffered an attack and understand the value in being more organised, or they realise the likelihood of one occurring and want to be prepared.

Cyber incidents can range in severity from a minor inconvenience to complete loss of the ability to conduct normal business, they are invariably stressful, frequently involving big decisions being made without necessarily having the full picture and may require a co-ordinated response from multiple areas of a business – it’s not just the IT department problem anymore.

The crux of why Incident Management is an essential component in a modern business is in a word control:

  • Control of understanding what has happened when an incident occurs, i.e. the scope and severity of the incident.
  • Control of the response to manage the situation and ensure the response doesn’t ultimately cause more harm than the incident.
  • Control of the recovery to restore normal operation as efficiently and quickly as possible.

What does Incident Management mean?

Before we get into this, there are two terms we need to be aware of – Cyber Incident Management, and Cyber Incident Response.

The Incident Management element is the overarching banner that manages the 6 different stages of the Incident response:

  1. Triage
  2. Analyse
  3. Contain/Mitigate
  4. Remediate/Eradicate
  5. Recover
  6. Review

We’ll talk more about these in the next section. But for now, lets just say that incident management is more of an oversight aspect that might be managed by a dedicated cyber response management team made up of stakeholders from across the business.

A cyber incident response therefore is a pre-existing methodology of steps to be taken during and after a cyber incident occurs with the cyber incident management being the management ‘plane’ co-ordinating and sometimes controlling the stages of the response.

As a whole the term incident management is a collection of pre-defined processes that direct who, how and when a business responds to the occurrence of cyber incidents.

It’s worth noting that the model in the graphic is a guide, individual cyber incident response plans may differ from business to business depending on requirements.


How do you do Incident Management?

First – you are going to need to develop a process to follow.

I’ve already mentioned that Incident management is more of an overarching term or function that acts as command and control to the actual incident response; this would typically be a team of stakeholders from across the business that provide oversight and guide the response to ensure it is proportionate.

Again, there are no hard and fast rules as such since no two businesses are identical, but broadly speaking there should be a tiered approach to incident management – e.g. having a minor, intermediate and major response plan could be a starting point since it would be impossible to develop a response plan specific to every potential scenario. Each tier would then dictate a different level of response and perhaps even a different approach to the incident.

Triage

When there are indications that an incident has or is occurring, the incident management team need to convene and begin understanding the scope of the incident they are looking at, its nature and decide which level of response is most appropriate – this could be determined by one or several factors such as the number of customers affected, the number of users affected, have mission critical services been affected – the criteria will likely depend on what is most important to your business’ operation.

Often the Triage phase will dictate which of the incident management plans will be invoked, part of the process would then be to set the response team off conducting the analysis phase, whilst the incident management team brief the business on the initial situation, provide notification of outages or disseminate preventative action they wish users to take.

Analyse

The purpose of the analyse phase is to understand exactly what is going on as quickly as possible, this phase is to help plan for the next phase but it’s also an opportunity to verify any assumptions were correct with regard to the scope of the incident – e.g. what looked like a minor incident may prove to be more serious once investigation is underway and the incident management team need to be briefed and take action accordingly.

Contain/Mitigate

Once analysis has been concluded there should be a good understanding of what is happening in the environment and steps can be initiated to stop the problem getting worse. The specific response is going to depend entirely on the nature of the incident but the intent of this phase to prevent the incident escalating further and to limit the damage to services and infrastructure. This phase may also extend to damage control to the business from a reputation perspective through the use of press releases to demonstrate honesty.

Remediate/Eradicate

Once the incident is controlled and is not worsening, the task of rectifying the issue or removing the threat that caused the incident begins, again the structure and processes of this phase depend on the nature of the incident as different cyber incidents will have different responses.

Recover

With the Cyber Incident now dealt with the focus needs to be on restoring business-as-usual operation and this is the recovery phase, i.e. getting the environment/business from the post incident state back to the point where normal operations can be resumed. This phase is made immeasurably easier if you had robust backup processes in place as restoring system services and data becomes a question of how long instead of how do we do it!

Read blog post: Recover from a cyber attack | CyberLab®

Review

The review phase is exactly what it sounds like, an after action debrief of what has happened, what did we do well, what could have been done better, did any part of the process not work, why didn’t it work and how to we make sure it works next time.

Review is almost as vital as any other area of the response plans as it means you will be better equipped next time to deal with the problem.

Training

One last section that isn’t part of the NCSC plan, but is recommended, is security training. Running desktop exercises should be conducted quarterly to ensure there is familiarity with the processes but it can also contribute to the Review section to help improve processes and increase the efficiency and speed of the response.

Want to test your incident response plan? The NCSC provide a great tool: Exercise in a Box – NCSC.GOV.UK


In Conclusion

Incident management processes deliver several benefits to your business:

  • Effective incident management lessens the impact of a cyber incident.
  • A practised plan will help you make good decisions under the pressure of a real incident.
  • A well-managed response, with clear communication throughout, builds trust with shareholders and customers.
  • Learning from incidents identifies gaps and issues with your response capability.

If you haven’t done so already, our Posture Assessment tool is a quick-and-easy way to identify your strengths and weaknesses, and get a better picture of your overall security posture.

We have put together a page of recommendations for improving your Incident Management, and which tools can help, which you can read here.

If you’d like to learn more about how to secure your organisation and keep your data secure, book a consultation with one of our experts.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Asset Management in Cyber Security

Asset Management in Cyber Security: Protecting Your Data & Systems

Protecting Your Data

Our host discusses the importance of Asset Management for organisations to bolster their cyber security.

He covers:

  • What is Asset Management?
  • Why do organisations need Asset Management?
  • What do with asset information

In today’s world, where cybercrime is on the rise and data breaches are a common occurrence, protecting your data can be a complex task.

It’s critical for organisations to understand how data is being accessed, whether the access is through secure mechanisms, and how to control that access. You can’t control or protect what you can’t see. Which is where asset management comes in.


What is Asset Management?

Asset management is one of the most crucial elements of protecting data, as it helps identify all devices connected to an environment, manage their level of access, and establish business processes to record new devices.

The main goal of asset management is to ensure that an organisation’s assets are being used effectively and efficiently while minimizing security risks and ensuring regulatory compliance.

Why Do We Need Asset Management?

Our business data is now the primary target of most cyber criminals, they know our businesses need that data to operate, transact business and ultimately to do what we do. Protecting data should be a priority for any organisation and one of the most important elements to protecting our data is understanding how it is being accessed. Every mechanism that can be used to access that data is a potential risk.

Device Discovery 

In larger environments or environments where the non-Enterprise Mobility Management capable device change or move around a lot, it may be necessary to utilise a product such as Forescout suite to identify all devices connected to your environment, the results of this can then be taken even further to manage the level of access they have using Network Access Control and Network Segmentation to restrict access of devices you have not authorised pending identification and authorisation.

Integrate Asset Management Into Your Organisation 

Implementing an Enterprise Mobility Management (EMM) solution for your organisation can provide several benefits. Firstly, it enables you to adopt efficient deployment practices whereby new devices are automatically enrolled into your EMM solution. This ensures that policies, restrictions, and software are automatically deployed onto the devices, resulting in a streamlined process. Furthermore, the devices will automatically report their status, allowing you to apply any new policies as needed.

To ensure that new devices are introduced to the environment in a controlled manner, it’s crucial to establish proper business processes. This includes recording new devices in your asset register, which ensures that the register accurately represents the devices in use. Whether you decide to include devices managed by your EMM in your asset register is a business decision. However, it’s worth noting that EMM solutions may facilitate integration, allowing details of the devices in the EMM or device discovery/control software to be replicated into your asset register.

So, we need to make sure that we have a clear understanding of what is or can access the data, is it a secure mechanism, and how we can control it?

It’s important to note that asset management is not just about device management as we’ll come onto later, but device management is a key part of it and can do most of the leg work needed for effective asset management so let’s start there.


What To Do With Your Asset Information

Identify who is responsible for what

In many cases environments can sprawl over time and who is responsible which system can become clouded. This can mean making changes or troubleshooting is much more time consuming than it needs to be. With a detailed view of the assets in the environment to use, it is clear where responsibility lies and this can help improve efficiency.

Identify business critical areas

Once you have a realistic picture of all the devices that make up your estate, identify those which are delivering or associated with critical business services, consider any dependencies they have, and then use that as to build a picture of the areas in your infrastructure that are most important to your business.

Bear in mind that data is also an asset; one that may not all reside on-premise or may be stored on removable media. Having a robust backup strategy in place that adheres to industry best practices and is tested regularly will ensure that your data will reliably be there when you need it.

Identify areas of vulnerability 

The asset information that you have will also help you to categorise areas that may represent more significant concerns from a security perspective – unsupported operating systems have become a problem for many organisations in recent years, servers hosting business critical applications or services that cannot be migrated to newer versions is one of the most common problems.

An area of common vulnerability in most environments is the ability for unmanaged endpoints, laptops in particular, to be physically connected to a network port in the office and granted access to production systems. Hackers can easily breach account credentials or find ways around them, preventing them from being able to access anything needs to be a priority in any business.

Users can be one of your strongest lines of defence against cyber threats, or they can be your greatest weakness. Cyber criminals research their targets and they use the intelligence gathered to fabricate extremely convincing social engineering campaigns. Don’t make it easy for them to do that. A robust cyber security training and engagement strategy is essential for any organisation.

Remove what you don’t need 

Sounds obvious, but sometimes as environments sprawl out of control and increase in complexity there can be uncertainty about exactly what a particular server does, and rather than risk an outage these devices can linger well beyond the end of their life unnecessarily.

Using the asset register and the allocation of responsibility for each device should enable extant devices to be identified and decommissioned.

Maintain and improve your asset management 

After putting lots of time and effort into building your asset management system, it is easy to let it atrophy and become out of date, always look at automated ways to ensure the information held is being actively updated so you have a high degree of confidence that what you are looking at is representative of what you have today.


In Conclusion

Protecting data should be a priority for any organisation, and asset management is one of the most critical elements of safeguarding against cybercrime and data breaches.

With a clear understanding of what devices can access the data, businesses can identify areas of vulnerability and business-critical areas, allocate responsibility for each device, and remove what is no longer needed.

Maintaining and improving asset management is an ongoing process, and businesses must continually monitor their environment to ensure their assets are being used effectively and efficiently, with minimized security risks.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Managing Cyber Risks

Managing Cyber Risks: Effective Strategies for Stronger Resilience

Risk Management in Cyber Security

Our host explains what risk management is and why it is important for businesses that are looking to increase their cyber security.

Topics include:

  • What is cyber risk management?
  • Five steps of Cyber Risk Management


What is Cyber Risk Management?

Cyber risk management has, for the most part, always been an element of any businesses risk strategy or management plan. Historically this was a case of making sure we were safe from Denial-of-Service attacks or disruptive/malicious software threats.

Today however the risks that businesses face in the digital workspace are both legion in number and variety; and the intent behind them is different. The impact they have on our business has similarly changed, it is no longer about causing a nuisance and/or disrupting the operation of a business and the services it offers.

Cyber risk management is now about taking a much more focussed approach on the risks posed by todays (and tomorrows) cyber threats; this means understanding and prioritising the types of cyber threat that are most relevant to your business, determining the magnitude of the impact they could have on your ability to work and trade normally, and developing/implementing solutions and countermeasures to mitigate those risks.

Five Steps of Cyber Risk Management

Identifying Risks

This involves assessing your systems, processes, and data to identify potential vulnerabilities and threats.

The first step to identifying risks to your business is to understand the mission-critical areas of your digital environment.

Key questions to identify these are: 

  • Which servers and/or services are critical to your ability to support business as usual operation?
  • What would be the impact on your business if these critical elements were unavailable?

Assessing the Likelihood & Impact

Once potential risks have been identified, the next step is evaluating the likelihood of each risk occurring and what potential impact on the organisation if it does occur.

The financial risks to a business today are without doubt the elephant in the room, they are often intangible and very difficult to measure, it’s easy to dismiss expensive cyber security solutions and “run the risk” of a significant cyber incident not happening – every day organisations discover that hard way that the financial risks they thought were acceptable turn out to be orders of magnitude higher than they anticipated.

Of course, not every cyber security ‘incident’ is apocalyptic in nature but there are some that are, and their ramifications need to be understood to the greatest extent possible.

Prioritising Risks

Based on the likelihood and impact of each risk, the organization should prioritize the risks that need to be addressed first. Don’t waste time on risks that are not credible at the expense of those that are. A key consideration for prioritising risk is asking how long could you sustain operations if one or more of these systems were lost?

Using a risk assessment framework is one of the best ways to prioritise the risks that have been identified. There are numerous frameworks freely available that assess risks using different approaches, its often a good idea to assess the same risks in different ways and compare the results to help you understand the severity of the risk to you; risks identified as concerns by both are a safe starting point as to where your priorities lie.

Implementing Controls

Businesses should implement proper controls to mitigate or eliminate the risks identified. These controls can include technical solutions such as firewalls and antivirus software, as well as policies and procedures to improve security awareness and incident response.

Consider how changing the way you operate might affect the risks you have identified, can small process changes or introducing security features of your existing solutions – such as encryption of data at rest – mitigate or eliminate the risks you have identified for little or no cost?

Monitoring and Reviewing

For most effective risk management, businesses need to be continuously monitoring their systems and processes. This is key to ensuring that the cyber security controls that have been implemented are effective and that new risks are identified and dealt with.


Conclusion

Many of us are only conducting perfunctory cyber risk assessments and we would greatly benefit from adjusting our approach, Gartner’s studies have led them to the same conclusion…

…by 2025, 60% of organizations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements.”

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

CyberLab In The Office

Cyber Essentials Funded Programme: Government Support for UK SME's

Helping UK SMEs Strengthen Cyber Defences with Government Support

In today’s digital-first world, cyber threats are no longer a distant concern – they’re a daily reality. The UK government’s Cyber Essentials scheme offers a practical, affordable way for organisations to defend against the most common attacks.

Whether you’re a small business or a growing tech innovator, this funded programme helps you build a strong security foundation, earn customer trust, and unlock new opportunities – including eligibility for government contracts. And with CyberLab’s expert guidance, getting certified is simpler than ever.


What is Cyber Essentials?

Cyber Essentials is a government-backed initiative to help businesses protect against the most common cyber threats. Originally launched in 2014, over 120,000 certificates have since been awarded to businesses of all sizes across the country.

According to the UK government, obtaining Cyber Essentials certification protects your organisation from approximately 80% of cyber-attacks, demonstrating a strong commitment to cyber security and data protection to customers and stakeholders. This certification enhances your organisation’s reputation, increases the likelihood of securing new business, and enables you to bid for and win UK government contracts. By ensuring that robust cyber security measures are in place, Cyber Essentials provides the peace of mind needed to focus on your core business objectives.

Cyber Essentials Plus

Cyber Essentials Plus is the next step in your cyber security journey – an advanced government-backed initiative for businesses looking to take extra measures to protect against common cyber threats.

Around a quarter of businesses who take the Cyber Essentials certification go on to achieve Cyber Essentials Plus.


What is the funded Cyber Essentials Programme?

Every business today faces the risk of a cyber attack, but some organisations are particularly vulnerable. This could be because they handle sensitive information about the people they work with or are seen as easier targets by cyber criminals.

To help those most at risk, the NCSC is rolling out a Funded Cyber Essentials Programme. This programme is aimed at supporting vulnerable organisations by helping them implement basic security measures to protect against the most common types of cyber attacks.

How Does it Work?

The programme offers practical support from an Advisor to help your organisation achieve Cyber Essentials Plus, at no cost to the organisation. However, if the Advisor recommends any extra software or hardware, those costs won’t be covered.

If you qualify, you’ll get around 20 hours of remote support with an Advisor. They’ll spend this time working with you to identify and implement improvements that suit your organisation’s size and needs, guiding you through the five Cyber Essentials technical controls. After that, there will be a hands-on technical check to make sure everything is in place.

If it turns out that achieving Cyber Essentials Plus isn’t possible, the Advisor will help you implement as many of the controls as you can and provide a clear list of what else needs to be done to get compliant. This scheme is designed to walk you through the technical controls required for Cyber Essentials certification, leading up to the Cyber Essentials Plus audit. No previous cybersecurity certification or experience is needed.

Who is Eligible for Support?

To qualify for this scheme, companies must be a micro or small business (1 to 49 employees) registered in the UK and working on:

  • The development of fundamental Artificial Intelligence (AI) technologies, OR the innovative application of Artificial Intelligence technologies in the following sectors: Public safety and health, Defence and security.
  • The development of novel Quantum technologies.
  • The design, development or manufacturing of semiconductors / semiconductor IP blocks.
  • The development of Engineering Biology or Synthetic Biology.

AND meet the following criteria:

  • Has not previously participated in the NCSC Funded Cyber Essentials Programme
  • Does not currently hold Cyber Essentials Plus (CE+) certification, has not been awarded CE+ certification since January 2023 and is not currently in the process of applying for CE+ certification


How CyberLab Can Help

As an IASME approved assessor, CyberLab is not only authorised to assess against the scheme, but also able to support your organisation to achieve certification.

Not only are we authorised Cyber Essentials assessors, we are also able to provide bespoke consultancy services to assist your team in meeting and maintaining the high standard of security required.

With our expert advice, you’ll pass first time.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

DORA

Understanding the Digital Operational Resilience Act (DORA)

A Guide for UK Businesses

The Digital Operational Resilience Act (DORA) is a landmark regulation introduced by the European Union (EU) to bolster the cyber security and operational resilience of the financial sector.

Despite DORA coming into effect as of 17th January 2025, little is still known about the new regulation and who it applies to. In this blog we cover what UK businesses and organisations need to know about DORA, its implications, and how to prepare.


What is DORA?

DORA is an EU regulation that aims to ensure financial institutions, and their critical ICT (Information and Communications Technology) providers can withstand, respond to, and recover from ICT-related disruptions.

It establishes uniform requirements for managing ICT risks, operational resilience, and incident reporting across the EU financial sector.

Key components of DORA include:

  • ICT risk management frameworks
  • Comprehensive incident reporting mechanisms
  • Regular operational resilience testing

Oversight of third-party ICT providers For more details, visit the European Insurance and Occupational Pensions Authority (EIOPA) for an overview of DORA.


Who Does DORA Apply to?

DORA applies to a wide range of financial entities and their critical third-party ICT service providers operating in the EU. These include:

  • Banks, payment service providers, and investment firms.
  • Insurance and reinsurance companies.
  • Cryptocurrency service providers.
  • Critical third-party ICT providers offering services like cloud computing, data analytics, and cyber security solutions.

For UK-based businesses, DORA applies if:

  • You provide financial services or ICT solutions to EU-based clients.
  • You are a critical ICT service provider for EU financial institutions.


What Does DORA Mean for UK Businesses and Organisations?

Even post-Brexit, UK companies working with EU clients must comply with DORA to maintain business relationships. Here’s how it affects your organisation:

Enhanced Cyber Security Requirements

  • Implement robust ICT risk management frameworks to safeguard against disruptions and cyber threats.
  • Ensure the confidentiality, integrity, and availability of critical data and systems.

Incident Reporting Obligations

  • Develop mechanisms to detect, report, and manage ICT-related incidents that could impact EU clients.
  • Timely reporting to EU financial institutions and, in some cases, EU regulatory authorities is mandatory.

Operational Resilience Testing

  • Conduct regular testing, including advanced techniques like threat-led penetration testing (TLPT), to assess your resilience.

Third-Party Risk Management

  • Ensure contracts with EU clients align with DORA’s requirements for security and operational resilience.
  • Prepare for audits and performance reviews by EU financial entities.

Governance and Accountability

  • Designate roles or teams responsible for ICT risk management and resilience.
  • Maintain clear documentation and transparency to demonstrate compliance.

To better understand how DORA might impact ICT service providers, consider the CSO Online analysis on DORA and the cyber security skills gap.


DORA Penalties for Non-Compliance

Non-compliance with DORA can lead to severe consequences, including:

Fines and Financial Penalties

EU regulators may impose significant fines on organisations failing to meet DORA’s requirements. For financial entities, fines can reach up to 2% of their total annual worldwide turnover, and individuals may face fines up to €1,000,000. Critical third-party ICT providers could face fines as high as €5,000,000 or €500,000 for individuals. [Source: Grant Thornton]

Operational Restrictions

Critical ICT providers may face restrictions on their activities or lose contracts with EU clients if found non-compliant.

Reputational Damage

Publicised non-compliance can harm an organisation’s reputation, impacting client trust and future business opportunities.

Compliance is not only a regulatory requirement but also essential for maintaining trust and resilience in an interconnected financial ecosystem.


Guidance and Recommendations for Businesses and Organisations Affected by DORA

To stay compliant and competitive in the EU market, consider these steps:

1) Evaluate Your Exposure to DORA

Assess whether your organisation provides services to EU financial institutions or acts as a critical third-party ICT provider.

2) Strengthen ICT Risk Management

  • Review and update your cyber security policies, incident response plans, and resilience testing protocols.
  • Utilise a Managed Detection and Response solution, such as Sophos MDR, to monitor and protect your systems 24/7.
  • Leverage tools like encryption, access controls, and threat detection systems.

3) Engage in Regular Testing

  • Schedule operational resilience testing, including penetration testing, to identify vulnerabilities and improve response strategies.
  • Utilise threat detection systems for continuous threat and attack surface monitoring between scheduled penetration tests.

4) Update Contracts and Agreements

Align your service agreements with EU clients to reflect DORA-specific terms, including transparency on risk management and incident handling.

5) Monitor Regulatory Developments

Stay informed about DORA’s implementation timelines and guidance issued by EU authorities.

6) Seek Expert Advice

Collaborate with legal, regulatory, and cyber security experts to ensure compliance and address potential gaps.


Conclusion

DORA presents both challenges and opportunities for UK businesses serving EU clients. By proactively adopting its principles, organisations can enhance their cyber security posture, demonstrate operational resilience, and build stronger relationships with EU-based partners. Compliance with DORA is not just a regulatory necessity – it’s a competitive advantage in today’s interconnected financial ecosystem.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Windows 10 End of Life

Why Windows 10’s End of Life Matters for Cyber Essentials Plus

Navigating Compliance After Microsoft Ends Support for Windows 10

Microsoft officially ended support for Windows 10 on 14 October 2025, marking a major shift for organisations working toward Cyber Essentials Plus (CE+) certification. Without free security updates or patches, Windows 10 devices now pose a compliance risk – unless covered by Microsoft’s Extended Security Updates (ESU) programme.

For CE+ applicants, this change is more than a technical footnote. It directly affects your certification status. Devices running Windows 10 are no longer considered secure by default. To remain compliant, organisations must upgrade to Windows 11 version 23H2 or newer (ideally 24H2 or 25H2).

If your CE+ audit is scheduled within the 90-day window following your Cyber Essentials certification, any Windows 10 devices must be upgraded or removed from scope before submitting your asset list to the auditor.


“With Windows 10 now out of support, organisations pursuing Cyber Essentials Plus must act quickly. Upgrading to Windows 11 isn’t just best practice – it’s essential for compliance. At CyberLab, we’re here to make that transition smooth, secure, and audit-ready.”

– Ryan Bradbury, CTO at CyberLab


Why It Matters

Auditors will now perform technical verification during CE+ assessments.

If Windows 10 devices are detected:

  • They must be excluded from scope.
  • Failure to do so could result in audit failure or the need to restart both Cyber Essentials and CE+ assessments.


What You Need to Do Now

To stay secure and compliant, here are your next steps:

  • Audit your device inventory: Identify any machines still running Windows 10.
  • Upgrade to Windows 11: Preferably version 24H2 or 25H2. Note that 23H2 reaches end of life on 11 November 2025, so plan accordingly.
  • Consider ESU: If upgrading isn’t feasible, explore Microsoft’s Extended Security Updates programme.
  • Communicate with your auditor: Be transparent about your upgrade plans and ensure your asset list reflects only compliant devices.

This transition is a critical moment for organisations aiming to maintain Cyber Essentials Plus certification. By acting now, you’ll avoid last-minute surprises and ensure your systems meet the latest security standards.

Need help navigating the upgrade or preparing for your CE+ audit? CyberLab’s team is here to support you.

Get Cyber Essentials

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Understanding Incident Management

Understanding Incident Management: Your Cyber Safety Net

Incident Response Essentials for Every Team

The importance of safeguarding your organisation’s assets, brand, and reputation against cyber threats cannot be overstated, and so goes the saying “prevention is always cheaper than the cure”, but what about when the worst has already happened?

This month we are focusing on Incident Response, which is often shortened to IR and is a part of Incident Management. We’re deep diving into IR services, and why all organisations need access to IR expertise and support. Discover how to contain and put out the fires that cyber incidents inevitably create with practical strategies for strengthening your organisation’s cyber safety net.


What is Incident Response?

Incident response is a structured approach to addressing and managing the immediate aftermath of a cyber attack or data breach. The incident response process often involves various stages including detection, containment, eradication, remediation, recovery, and lessons learned.

Tales from the CyberLab: Ransomware Response Explained


Incident Response Retainers: Are They Really Necessary?

Incident response retainer services offer organisations proactive support and expertise in handling cyber incidents effectively. These retainer services provide organisations with access to a team of dedicated cyber security professionals who can rapidly respond to incidents when needed. These experts conduct forensic investigations, compromise assessments, and other critical tasks to minimise potential damage and mitigate risks. Additionally, they may offer guidance on handling fallout and media coverage of incidents, ensuring that organisations maintain transparency and effectively manage public perception.

While incident response retainers may initially seem like an additional expense burdening already stringent budgets, their value cannot be overstated. In fact, investing in an incident response retainer can potentially save organisations from incurring staggering costs in the aftermath of a cyber attack.

The reality is that cyber threats are becoming increasingly sophisticated and pervasive, making it not a matter of if, but when, an organisation will face a cyber incident. When such incidents occur, the financial and reputational consequences can be devastating. From the costs associated with downtime, data loss, and recovery efforts to the damage inflicted on brand reputation and customer trust, the fallout of a cyber-attack can be significant.

Furthermore, as we touched on in Reducing Your Cyber Insurance Premiums blog, having an incident response retainer in place can also demonstrate to cyber insurance providers that the organisation is taking proactive steps to manage and mitigate cyber risks, potentially leading to reduced insurance premiums. In essence, incident response retainers serve as a crucial safety net, offering peace of mind and financial protection in the face of evolving cyber threats.


Fail to Prepare; Prepare to Fail

Real-world incidents serve as poignant reminders of the critical importance of robust incident response capabilities. Take, for instance, the notorious NotPetya cyber-attack on Maersk in 2017. Detailed in The Daily Swig, this incident underscored the need for resilience and preparedness in mitigating the impact of cyber threats.

Furthermore, insights from Ship Technology shed light on the vulnerabilities exposed by the Maersk cyber-attack. A study by Futurenautics revealed that 44% of ship operators at the time did not believe that their companies’ cyber security defence capabilities were sufficient enough to repel cyber-attacks, and that 39% had experienced a cyber-attack in the last 12 months. These findings emphasised the urgent need for under-prepared industries to fortify their cyber security posture and adapt to the ever-changing threat landscape.

It was not just the maritime industry that demonstrated the need for industry-wide, incident response readiness. In the same year as the Maersk incident, the infamous WannaCry ransomware attack wreaked havoc on various organisations around the world, particularly the National Health Service (NHS). The WannaCry attack exploited vulnerabilities in outdated software systems, leading to widespread disruption of NHS services, including cancelled appointments, delayed surgeries, and compromised patient care. According to a “Lessons Learned” report by NHS England following the incident, The attack led to the disruption of services in one third of hospital trusts in England, with 80 out of 236 trusts effected.

A recent report conducted by Pheonix Software and the National Housing Federation (NHF) titled “The State of Cyber Security in Housing 2023’ found that just 4% of UK housing associations feel sector is fully prepared for ransomware attack.

It’s not just specific industries that are underprepared, as research found that 73% of surveyed organisations across the U.S., EMEA and APAC countries suffered a ransomware attack in 2022, with 38% being attacked more than once. (source: PR Newswire).


Conclusion

Facing a rapidly changing threat landscape; Ransomware attacks becoming more advanced and frequent, the emergence of AI in cyber attacks, geo-political tensions and increasing concerns about threats to national infrastructure, organisations across all sectors must take proactive steps to enhance their incident response capabilities. Initiatives like Red Teaming and Penetration Testing offer valuable opportunities for organisations to test and refine their incident response procedures through simulated scenarios, ensuring readiness to effectively mitigate cyber attacks.

Leveraging specialised incident response services, from providers like Sophos, can provide organisations with expert guidance and support in navigating cyber incidents. By investing in comprehensive incident response solutions, regularly revising incident response plans, and actively participating in training and exercises, organisations can bolster their resilience against cyber threats and minimise the potential impact of security incidents.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation