The True Cost of Cyber Security

Build or Buy? The True Cost of Cyber Security for Modern Firms

A CFO's Perspective

Tom Davies, CFO at CyberLab, explores the big question: Should you build an in-house security team or outsource to an MSSP?


In today’s threat landscape, cyber security is not optional – it’s essential.

But when businesses face the challenge of securing their digital assets, a fundamental question arises: should they build an in-house security function or buy external cyber security services from a Managed Security Services Provider (MSSP)?

This was the focus of our recent webinar, “Build or Buy? The True Cost of Cyber Security,” where our experts broke down the real-world implications of each approach. Featuring CyberLab experts: Tom Davies (CFO), Ben Davison (Managed Services Team Leader) and Ryan Bradbury (CTO).


The Rising Cost of Cyber Security

Cyber threats are evolving, and so are the costs associated with defending against them. Ransomware attacks, data breaches, and compliance fines are just a few of the financial risks businesses face today. However, cyber security investment goes beyond just risk mitigation – it plays a critical role in brand reputation, customer trust, and operational resilience.

There’s No One-Size-Fits-All Approach to Cyber Security

When it comes to cyber security, there’s no universal solution suitable for every organisation. Factors such as company size, budget constraints, and specific security requirements play pivotal roles in determining the most appropriate approach.

While some organisations may benefit from building robust in-house security teams, others might find that partnering with external providers aligns better with their operational needs and resources.

The Case for Building an In-House Cyber Security Team

For larger enterprises with complex, bespoke security needs, establishing an in-house cyber security team can offer greater control and customisation. These organisations often have the resources to invest in specialised personnel and infrastructure, enabling them to tailor security measures closely aligned with their unique operational frameworks and compliance obligations.

However, there are challenges:

  • High upfront costs
    Recruiting, training, and retaining skilled cyber security professionals can be expensive, especially given the ongoing talent shortage.
  • Technology investment
    An in-house team requires significant spending on security tools, infrastructure, and continuous upgrades.
  • Scalability issues
    As cyber threats evolve, so do security requirements. Scaling an in-house team requires constant investment in both personnel and technology.

The Case for Outsourcing a Managed Security Service Provider

For organisations that do not have highly specialised security requirements or the budget to build and maintain an extensive in-house team, partnering with a Managed Security Service Provider (MSSP) can be a practical and efficient solution.

MSSPs offer access to expert security services and technologies on a scalable basis, allowing organisations to maintain robust security postures without the overhead of developing these capabilities internally.

Benefits include…

  • Expertise on demand
    External providers have dedicated security experts who stay ahead of emerging threats and compliance changes.
  • Cost efficiency
    Rather than investing heavily in building an in-house team, businesses can leverage established security frameworks and technologies.
  • 24/7 monitoring
    Cyber security threats don’t adhere to office hours. External services offer round-the-clock threat detection and incident response.
  • Regulatory compliance
    Many industries have strict security regulations. Outsourced security providers ensure compliance without burdening internal teams.


“CyberLab’s managed services have been a game-changer for us. They’ve allowed me to focus on the bigger picture while knowing our operations are secure around the clock. Their proactive approach and tailored solutions have provided us with the peace of mind to continue delivering excellence to our customers.”

– Matt Cooper, IT Manager, Futaba Manufacturing UK

Read Case Study

Cost Breakdown: In-House vs. MSSP

Understanding the financial implications of each approach is key to making an informed decision. Here’s a general cost comparison:

In-House Security Team Costs

  • Salaries
    Cyber security professionals command high salaries, with CISOs often exceeding six figures.
  • Training & Certifications
    Ongoing education is required to stay ahead of evolving threats.
  • Technology Investment
    Businesses need to purchase and maintain SIEM solutions, firewalls, endpoint protection, and more.
  • Incident Response & Recovery
    A breach could mean expensive forensic investigations and legal fees.

In-House Security Team Costs

    • Subscription-Based Pricing
      Typically a fixed monthly or annual cost, reducing unpredictable expenses.
    • Access to Experts
      Avoids the overhead of hiring and training an internal team.
    • Scalability
      Easily scales with business needs, without requiring major new investments.

    While building an in-house team may seem attractive for control and customisation, the costs can add up quickly. An MSSP offers predictable pricing and access to a broad range of expertise without the financial burden of hiring and retaining staff.

Key Considerations Before Making a Decision

Before deciding whether to build or buy cyber security, businesses should consider the following factors:

      • Company Size & Resources
        Large enterprises may have the budget for an in-house team, while SMEs may benefit more from outsourcing.
      • Industry Regulations
        Some sectors, like finance and healthcare, have strict compliance requirements that may influence the decision.
      • Risk Tolerance
        Businesses that handle sensitive data may require more hands-on security measures.
      • Existing IT Capabilities
        If a company already has a strong IT team, augmenting with external services might be the best hybrid approach.
      • Response Speed
        In-house teams may provide faster internal responses, while MSSPs offer 24/7 monitoring and incident response.

The Hybrid Approach: A Strategic Middle Ground

For many organisations, the best solution isn’t a binary choice – it’s a hybrid approach.

Businesses can maintain internal oversight of critical security operations while leveraging external expertise for specialised tasks such as threat intelligence, incident response, and compliance audits. This model balances control, cost, and effectiveness.

Making the Right Decision for Your Business

Ultimately, the decision to build or buy cyber security depends on various factors, including budget, industry regulations, and internal expertise. However, as cyber threats continue to escalate, businesses must act decisively to ensure they are adequately protected.

At CyberLab, we help businesses navigate this decision by offering tailored security solutions that align with their unique risk profiles. If you’re considering your next steps in cyber security investment, get in touch with our team to explore the best approach for your organisation.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Defence in Depth

Defence in Depth: Layered Security Strategy for Modern Cyber Risks

Securing Organisations Against the 2025 Threat Landscape

Cyber security threats in 2025 have become more advanced, with attackers leveraging AI, supply chain vulnerabilities, and geo-political tensions to launch increasingly sophisticated and targeted campaigns.

As cyber threats grow in complexity and capability, Defence in Depth remains one of the most effective strategies to protect organisations against threats and mitigate the advancement of cyber attacks.

What is Defence in Depth?

Defence in Depth is a layered security approach that ensures multiple safeguards are in place to protect against various attack vectors.

Rather than relying on a single security measure, this strategy integrates multiple defensive layers. These defensive layers range from physical and network security to user training and incident response. The benefit of this layered approach to defence is that if one layer is breached, others continue to provide protection.


The 2025 Cyber Threat Landscape

According to the NCSC Cyber Security Breaches Survey 2024, 50% of businesses reported experiencing a cyber-attack or breach in the past year. While larger enterprises remain primary targets, 32% of medium-sized businesses and 27% of small businesses also faced cyber incidents, highlighting the growing need for strong cyber security strategies. [source: NCSC]

Increased Attacks on Critical National Infrastructure & Supply Chains

Nation-state actors and cyber-criminal groups are increasingly targeting essential services such as energy, water, healthcare, and transportation. Supply chain attacks have also surged, with attackers infiltrating widely used software and IT providers to gain access to multiple organisations at once.

Defence in Depth Mitigation:

  • Network segmentation to isolate critical assets.
  • Continuous monitoring and risk assessment of third-party vendors.
  • Zero Trust architecture to limit access to essential systems.
  • Incident response planning for handling supply chain disruptions.

Rise in Ransomware & Data Extortion Attacks

Ransomware remains a top threat, with attackers adopting double and triple extortion tactics. The 2024 survey found that 19% of businesses that suffered a breach were targeted by ransomware, often leading to financial and reputational damage.

Defence in Depth Mitigation:

  • Regular vulnerability scanning and patch management.
  • Penetration testing across the IT estate
  • Immutable backups to protect against data loss.
  • Network segmentation to limit ransomware spread.

AI-Driven Social Engineering & Business Email Compromise (BEC)

Cybercriminals have now started using AI-powered phishing campaigns, deepfake technology, and social engineering tactics to manipulate employees and executives into revealing sensitive information or transferring funds.

According to the UK Department for Science, Innovation & Technology phishing remains the most common type of cyber incident in 2025, with 74% of businesses and 72% of charities reporting they experienced a phishing incident in the past 12 months.

Defence in Depth Mitigation:

  • Email filtering and anomaly detection. Consider AI-powered tools that can intuitively detect and remove even the most advanced phishing emails.
  • Multi-factor/2-factor authentication (MFA/2FA) remains the single most effective control against phishing attempts.
  • Security awareness training focused on AI-driven threats.
  • Verification processes for high-value transactions.


Implementing Defence in Depth: A Multi-Layered Approach

Defence in Depth was originally adapted from an ancient military strategy, designed to slow the advancement of an attacking enemy so that they exhaust their resources and lose momentum.

Translated into the field of cyber security, this strategy can buy targeted organisations vital time to adapt and respond to the incident, ensuring the most sensitive assets remain protected.

To be prepared to face a real cyber incident, organisations must implement a Defence in Depth strategy that covers all aspects of cyber security, including:

1. Physical Security – Secure data centres, restrict access, and implement biometric authentication. Physical penetration testing such as Red Team/Tiger Team exercises should be conducted on physical security measures, assessing access control weaknesses, surveillance blind spots, and the effectiveness of security response procedures. Red Team exercises can simulate real-world intrusions, testing how well physical security controls prevent unauthorised access.

2. Network Security – Deploy firewalls, IDS/IPS, and enforce network segmentation. Regular penetration testing should be conducted against network perimeter defences, external and internal infrastructure, internal network segmentation, and VPN security.

3. Endpoint Security – Use robust endpoint detection & response (EDR) solutions or consider partnering with a managed security services provider (MSSP) for managed detection & response (MDR) services. Testing should evaluate endpoint resilience, including BYOD policies and remote device security.

4. Application Security – Conduct regular security testing and vulnerability assessments of public-facing and internal applications, including any exposed API endpoints.

5. Data Protection – Enforce encryption, access controls, and backup strategies.

6. User Training & Awareness – Conduct ongoing cyber security education to recognise phishing and social engineering threats.

7. Incident Response & Business Continuity – Develop incident response plans, and test them utilising services such as penetration testing and red teaming.

8. Zero Trust Architecture – Use zero-trust architecture and implement strict verification protocols across all access points.

9. Vulnerability Management – Continuously monitor, assess, and remediate security gaps across infrastructure, cloud environments, and operational technology (OT) by using vulnerability management tools, and patching software.

10. Red Teaming & Attack Simulations – Organisations should consider conducting red team assessments, not just against their physical security controls, but to test the overall effectiveness of their Defence in Depth strategy, evaluating how well layers of security work together to detect and respond to advanced persistent threats (APTs) across various sophisticated attack scenarios.


Conclusion: Why Defence in Depth is More Critical Than Ever

As cyber threats become more advanced and widespread, adopting a Defence in Depth approach is no longer optional – it is essential. By implementing multiple layers of security across networks, endpoints, cloud environments, applications, and user domains, organisations can significantly reduce their risk exposure.

Whether securing a nation’s critical infrastructure, a large enterprise, or an SME, a well-planned Defence in Depth strategy ensures resilience against ever-evolving threats.

With AI-powered cyber-attacks, state-sponsored threats, and ransomware innovations reshaping the threat landscape organisations should review their current cyber security strategy today and take pro-active steps to implement a robust Defence in Depth approach.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Protect the Public Sector

Protect the Public Sector: Understanding CAF & Log Management

CyberLab Team Up with Logpoint

In a recent CyberLab webinar with Logpoint‘s Director of Sales Engineering, Paul Gower, we delved into two critical areas of cyber security that are essential for protecting public sector organisations: Cyber Assessment Frameworks (CAF) and Log Management.

These frameworks, some of which are provided by the NCSC, provide the foundation for identifying, mitigating, and responding to cyber threats in a structured and effective manner.

As public sector organisations face increasing cyber risks, from data breaches to ransomware attacks, understanding and implementing robust cyber assessment frameworks and effective log management strategies is vital.



The Role of Cyber Assessment Frameworks in Public Sector Cyber Security

Cyber Assessment Frameworks (CAF) are designed to guide organisations through the process of evaluating and improving their cyber security posture. The recent webinar underscored that a key challenge for public sector bodies is ensuring that their security measures align with regulatory and compliance requirements, while also addressing the dynamic nature of cyber threats.

A CAF provides a systematic way to assess an organisation’s existing cyber security controls, processes, and policies. These frameworks are essential for identifying vulnerabilities, understanding risks, and establishing best practices for mitigating those risks. For public sector organisations, implementing a CAF offers a clear path to achieving a high level of resilience against cyber threats.

The key components of a cyber assessment framework discussed in the webinar included:

  • Risk Assessment: Understanding the unique cyber risks faced by public sector bodies, such as the protection of sensitive citizen data and the security of critical national infrastructure (CNI).
  • Controls and Policies: Ensuring that security controls and policies are well-defined and effectively enforced. This includes user access controls, data protection measures, and incident response protocols.
  • Continuous Improvement: Emphasising the importance of regular reviews and updates to the cyber security posture, as threats and technologies evolve.

By adopting a CAF, public sector organisations can not only meet compliance standards but also ensure that they are proactively addressing security risks in an evolving threat landscape.


Log Management: The Backbone of Effective Cyber Defence

Log management emerged as another central theme in the webinar, with experts explaining its role in cyber security. Logs contain crucial information about system activities, user interactions, and network traffic. When properly managed, logs provide a valuable source of intelligence that can help organisations detect, analyse, and respond to security incidents.

For public sector organisations, log management is particularly important due to the sensitive nature of the data they handle. Effective log management enables security teams to track potential breaches, identify suspicious activities, and maintain a clear audit trail for compliance purposes.

The webinar emphasised the following best practices in log management for public sector organisations:

  • Centralised Logging: Aggregating logs from various systems and platforms into a centralised location ensures that security teams have a comprehensive view of activities across the organisation.
  • Real-Time Monitoring: Continuous monitoring of logs enables teams to identify and respond to threats as they occur, reducing the risk of delayed detection.
  • Retention and Compliance: Retaining logs for the required period and ensuring that they meet regulatory compliance standards is essential, especially for public sector organisations that are subject to strict data protection regulations.
  • Log Analysis and Automation: With the volume of logs generated daily, manual analysis can be overwhelming. AI-driven log analysis tools can automate the process of identifying anomalies and potential threats, allowing security teams to focus on higher-level decision-making.


Integrating Cyber Assessment Frameworks with Log Management

A key takeaway from the webinar was the importance of integrating cyber assessment frameworks with log management strategies. Both components complement each other to create a more holistic approach to cyber security.

By aligning the findings from cyber assessments with real-time log data, public sector organisations can continuously evaluate their security posture and ensure that they are detecting and responding to emerging threats. This integrated approach can also help organisations improve their incident response times, reduce vulnerabilities, and strengthen overall resilience.

For example, during an active cyber attack, logs can provide critical insights into how an attacker is moving through the network, while the cyber assessment framework ensures that appropriate defensive measures are in place to respond to such threats. Together, these elements form a robust defence against the growing number of cyber threats targeting public sector organisations.



Key Security and Compliance Challenges Facing the Public Sector

Legacy Systems

Many public sector organisations rely on outdated systems that are more vulnerable to attacks. These legacy systems often lack modern security features or are difficult to patch due to compatibility issues.

Resource Constraints

Budgetary limitations and resource shortages in IT and cyber security teams leave gaps in defence strategies, making public sector entities more susceptible to attacks.

Decentralised Structures

Similar to challenges faced in education, public sector organisations often have decentralised systems with numerous access points, making monitoring and securing endpoints a complex task.

Compliance Pressure

Compliance with frameworks like the Cyber Assessment Framework (CAF) is necessary but can strain already limited resources. The webinar emphasised how balancing compliance and proactive defence can be difficult.

Human Error and Insider Threats

Phishing remains a prevalent attack vector, exploiting the human element within organisations. Insufficient training for employees exacerbates the risk of falling victim to social engineering attacks.

Supply Chain Vulnerabilities

Public sector organisations often work with external contractors and suppliers, increasing the risk of supply chain attacks, which were mentioned as a growing concern.


Best Practices and Recommendations for Public Sector Organisations

To effectively combat cyber threats, public sector organisations must adopt a proactive and tailored cyber security strategy. This begins with conducting a comprehensive risk assessment to measure their overall cyber security posture and to understand what makes their organisation an attractive target.

Public sector entities should consider the assets they manage—whether it’s sensitive citizen data, critical infrastructure systems, or classified government information. Furthermore, organisations need to evaluate their relationships with third-party vendors, contractors, and external collaborators, as these partnerships may introduce additional risks.

Geographic location and political context can also influence the threat landscape, particularly if the organisation is involved in high-profile projects or operates in regions of interest to state-sponsored actors. High-ranking officials or individuals of public interest within these organisations may also attract targeted attacks, making VIP and high-risk individual protection crucial. The NCSC has published guidance for supporting such individuals within public sector environments.

With the right guidance and expertise, cyber security teams, compliance officers, and other internal stakeholders can identify their most significant risks, the threat actors most likely to target them, and the methods these adversaries are likely to employ. This enables the creation of a robust “blueprint” for an optimal cyber security strategy and posture hardening.

Armed with this understanding, public sector organisations can then implement best practices such as:

Adopting a Zero Trust Architecture

This approach assumes no user or device is trusted by default, even if they are already inside the network. This approach is especially crucial for public sector organisations, given their complex infrastructure, multiple access points, and the diverse range of stakeholders accessing resources from various locations and devices.

Example in the Public Sector: Government agencies can implement micro-segmentation within their networks to limit the movement of attackers if a breach occurs. For instance, restricting access to sensitive citizen data or administrative systems through segmented network zones can prevent unauthorised access, even if an attacker has already compromised one area.

Another common practice is continuous authentication, where the system regularly checks user credentials and behaviour, such as location, device type, or network usage, to identify any anomalies that could indicate a breach.

Case Study: The US Department of Homeland Security adopted a Zero Trust approach, implementing secure, role-based access controls for its critical systems. This minimised access privileges for non-essential users and continuously verified user identity, reducing the risk of lateral movement by attackers.

Strengthening Access Controls

Implementing Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC) ensures only authorised individuals can access critical systems and data.

MFA requires users to present two or more forms of verification (something they know, something they have, and something they are). This is particularly effective in defending against phishing attacks, which are highly prevalent in the public sector.

Example in the Public Sector: Implementing MFA across government systems for both employees and contractors can prevent unauthorised access, even if login credentials are stolen. For instance, agencies can require users to verify their identity using a mobile app or a hardware token in addition to their password.

Case Study: Implementing MFA is part of the Cyber Essentials Accreditation. Discover how the NHS strengthened their cyber security posture with CyberLab in our NHS Case Study.

Regular Software Updates and Endpoint Protection

Ensuring that all devices, including those used remotely (BYOD), have up-to-date antivirus and firewall protection is critical. Regular software updates are vital to patch known vulnerabilities. Additionally, enabling remote wipe capabilities for lost or compromised devices ensures sensitive data can be erased quickly.

Phishing and Social Engineering Awareness Training

Public sector employees are often the first line of defence against cyber threats. Regular training sessions on phishing, social engineering, and secure data handling can significantly reduce the risk of human error leading to a security breach. Training should be tailored to address specific threats targeting public sector entities, such as impersonation of government officials or fraudulent invoices.

Managed Detection and Response (MDR)

Endpoint detection alone is no longer sufficient given today’s digital threat landscape. Public sector organisations must now employ an “always-on” threat detection and monitoring capability. However, employing and retaining qualified cyber security analysts and engineers can be very expensive. Running a 24/7 SOC (Security Operations Centre) in-house with experienced analysts and security experts with state-of-the-art defensive technologies is often reserved for large-scale government bodies.

MDR services provide continuous monitoring and analysis of an organisation’s entire estate, including endpoints, network traffic, and activity logs. By outsourcing to experts, public sector organisations can ensure that threats are detected and mitigated in real-time, reducing the risk of a successful attack.

Incident Response and Recovery

Having a robust incident response plan is essential for mitigating the damage caused by cyber incidents. Public sector organisations should invest in both in-house and outsourced incident response teams to ensure a swift and effective reaction to breaches. Regular assessments of cyber incident response plans (CIRP) or ‘tabletop exercises’ simulating various cyber incident scenarios ensure response strategies are robust and understood by all risk owners.

Vulnerability Management

Regularly updating and patching software, coupled with continuous vulnerability assessments, is vital for maintaining a secure infrastructure. Cyber security as a Service (CSaaS) solutions, such as CyberLab Control, can help public sector organisations manage vulnerabilities effectively without overburdening internal teams.


Conclusion: A Unified Approach to Public Sector Cyber Defence

Protecting public sector organisations against cyber threats requires a strategic, integrated approach that combines both cyber assessment frameworks and effective log management. By focusing on these key areas, public sector bodies can ensure they are well-prepared to defend against the growing range of cyber threats.

Our webinar with Logpoint served as a valuable resource for organisations looking to improve their security posture and implement best practices in the face of an ever-evolving digital landscape.


Common Cyber Security Challenges in the Public Sector

Here are some key findings detailing the quantity of different types of cyber-attacks that public sector organisations have encountered over the past 12 months, as well as insights into the other cyber security challenges they are facing.

Ransomware Attacks

34% of state and local government organizations were hit by ransomware in 2024. This represents a 51% decrease from the 69% attack rate reported in 2023. Furthermore, 56% of computers in state and local government organizations are impacted by a ransomware attack if one occurs.

Data Encryption

It is extremely rare for state and local government organizations to have their full environment encrypted: just 8% reported that 81% or more of their devices were impacted. At the other end of the scale, while some attacks do impact only a handful of devices, this too, is highly unusual, with only 2% of state and local government organizations saying that 10% or fewer of their devices were affected.

Compromised Credentials

All state and local government respondents hit by ransomware were able to identify the root cause of the attack. Compromised credentials were the most common method of entry (49%), followed by exploited vulnerabilities (24%).

Backup Compromise

99% of state and local government organisations reported that cybercriminals attempted to compromise their backups, exceeding the global average of 94%.

Data Theft

Adversaries don’t just encrypt data; they also steal it. 42% of state and local government organizations reported that where data was encrypted, data was also stolen.[Source: Sophos State of Ransomware Report 2024]

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

What Is A Pen Test

What is Penetration Testing? Everything You Need To Know About Security Testing

Everything You Need To Know

Penetration Testing, or a Pen Test, is a security test that launches a mock cyber attack to find vulnerabilities in a computer system.

A pen test is a way to identify vulnerabilities before attackers do, evaluate how effectively you can respond to security threats, assess your compliance with security policies, and improve the level of security awareness amongst your staff.

Penetration testers are security specialists trained in ethical hacking, using hacking methods and tools to identify and fix vulnerabilities rather than exploit them maliciously. Organisations purchase pen testing services to carry out simulated attacks on their applications, networks, and other systems. These controlled attacks enable security teams to discover serious weaknesses and strengthen their overall security defences.

While “ethical hacking” and “penetration testing” are sometimes used interchangeably, there is a subtle distinction. Ethical hacking is a broader discipline within cyber security that encompasses any application of hacking expertise to bolster security. Penetration testing, or pen testing, is one specific approach within ethical hacking, focusing on attack simulations. Ethical hackers may also offer malware analysis, risk evaluations, and other security-enhancing services.


Types of Penetration Testing

Penetration Testing

Penetration Test aims to exploit the vulnerabilities of an organisation’s cybersecurity arrangements before a malicious party does. It uses a combination of automatic and manual techniques to identify issues within the infrastructure, systems and operations.

Vulnerability Assessment

Vulnerability Assessments are most often used by organisations when they want to identify the vulnerabilities present in their infrastructure and to get a high-level overview of their security posture. It involves an external approach and is fully automated.

Vulnerability Assessments are useful for companies who do not have visibility or understanding of their security posture. A vulnerability assessment can often be used as the first stage of a larger penetration testing project.

For organisations with legacy infrastructure, it is a quick, cost-effective way to identify and focus on software versions and systems that can be fixed easily.

External Penetration Test

An external penetration test replicates a real-life attack, searching for vulnerabilities that can be exploited by a hacker. This type of analysis aims to target everything Internet-facing. The penetration tester will focus on identifying network vulnerabilities. This can include issues with network services and hosts, devices, web, mail and FTP servers.

Objective Examples: Obtaining internal access to the network

Internal Penetration Test

An internal penetration test aims to identify and exploit internal vulnerabilities. Vulnerabilities can range from misconfigurations through to unpatched software and social engineering. The approach would be similar to an external penetration test, and the process followed would be the same.

Often the aim of this test can be unique to each client. A customer’s objective could be to gain access to a sensitive file or the domain controller with full admin rights, to elevate privileges or to perform an overall security assessment.

This type of test is only possible with access to the internal network either provided by the customer or gained by dropping a device like a dropbox or Raspberry PI onto any open network port, or by exploiting a compromised system i.e. emails.

Objective Examples: Leveraging internal access to obtain access to important assets on the network

Web Application Penetration Test

The web application penetration test aims to find weaknesses in applications programmed in-house or out of the box solutions, as well as ill-coded websites.

Web Apps are often vulnerable to many types of attacks that are often possible through the exploitation of misconfigurations in server builds or through bad coding practices. Vulnerabilities are often identified within functions where user input is received, like website search, address fields, file uploads, where SQL queries can be passed to gain access to back end databases. If either of those functionalists are not appropriately secured an attacker could exploit them to upload a malicious document that can create a back door giving a user unauthorised access to the underlying server it is running on.

Due to the world wide web being publicly exposed many websites and online stores come under constant attack. Identifying these vulnerabilities before anyone else can allows remediation actions to take place to secure the web app.

Examples: Brute-force attack, Error handling, SQL Injection and XSS.

Social Engineering

Social engineering is manipulating people into leaking sensitive information and providing an external malicious agent with unwarranted access to a network or building. It exploits the gaps in cyber security education in organisations and employs psychological persuasion.

The pen tester will research different aspects of the company and its people, refer to social media and current events, to gain the trust of the host and blend in with the organisation. However, social engineering is not limited to physical infiltration, but can also involve the use of email, social media and calls.

Performing such a test can reveal the gaps in cybersecurity awareness of the organisation’s people and stress the importance of employee training.

Examples: Phishing campaigns, traditional scamming techniques such as authority figure impersonation.

Red Team Engagement

A red team engagement is the more advanced version of a penetration test appropriate for companies with mature, well-established security arrangements. Compared to a pen test, they tend to take longer and often require multiple testers. The main objective is not to find and exploit all vulnerabilities, but instead, it is a targeted attack with a single objective aiming to be completely unnoticeable. Such tests are performed in scenarios where there is an immediate Blue team (Response Team) to stop a Red team (Attackers) in their tracks.

Black-Box Testing

In black-box testing, a tester doesn’t have any information about the internal working of the software system. It is a high-level assessment that focuses on the behaviour of the software. It involves testing from an external or end-user perspective. Black-box testing can be applied to virtually every level of software testing: unit, integration, system, and acceptance.

White-Box Testing

White-box testing is a testing technique which checks the internal functioning of the system. In this method, testing is based on coverage of code statements, branches, paths or conditions. White-box testing is considered as low-level testing. The white-box testing method assumes that the path of the logic in a unit or program is known.


Penetration Testing

Leave it to our team of expert penetration testers to identify vulnerabilities in your environment.

Our tailored assessments can cover every aspect of network security from general vulnerability identification to fully exploiting vulnerable web applications.

Learn More

What is SASE and How Does it Work?

What is Secure Access Service Edge (SASE) and How Does it Work?

What You Need To Know

Secure Access Service Edge (SASE) is a modern approach that combines wide area networking with cloud‑delivered security to provide secure, reliable access to applications and data from any location.

As organisations adopt hybrid work and cloud services, SASE helps maintain consistent security and user experience without relying on traditional, data centre‑centric designs.

CyberLab explains what SASE is, the core components, how it differs from Security Service Edge (SSE), and when to prioritise each.


What is Secure Access Service Edge (SASE)?

SASE (pronounced “sassi” or “sassy”) converges SD‑WAN capabilities with cloud‑based security controls. Instead of routing all traffic through a central data centre, SASE enforces security as close as possible to the user, device or branch, and then connects to applications wherever they live, whether in public cloud, private data centres or SaaS.

At its core, SASE:

  • Uses identity as the primary control point. Policies follow the user, device and context, not an IP address or fixed location.
  • Delivers networking and security as a service, so controls are consistent and scalable.
  • Improves user experience by steering traffic intelligently and enforcing security without unnecessary backhaul.


SASE Components

SASE brings together several building blocks. Individual features may already exist in many environments; SASE unifies them with a single policy and delivery model.

1) Software‑defined Wide Area Network (SD‑WAN)

SD‑WAN uses software to route traffic over multiple links such as MPLS, broadband and LTE. It prioritises important applications, improves resilience and reduces reliance on costly private circuits. Policies decide the best path based on performance, availability and business need.

2) Cloud Access Security Broker (CASB)

A CASB sits between users and cloud services to apply enterprise security policies. Typical functions include authentication, authorisation, data loss prevention, encryption or tokenisation, device posture checks, logging and threat detection for SaaS usage.

3) Firewall as a Service (FWaaS)

FWaaS delivers next‑generation firewall capabilities from the cloud. Instead of running and scaling on‑premises appliances, traffic is inspected in the provider’s fabric using a consistent rule set for all locations and users.

4) Zero Trust Network Access (ZTNA)

ZTNA replaces broad network access with explicit, least‑privilege access to specific applications. Every request is authenticated and authorised based on identity, device health and context. The principle is simple: never trust, always verify.

5) Secure Web Gateway (SWG)

An SWG protects users when accessing the web. It filters malicious content, enforces acceptable use policies, applies DNS and URL controls, and inspects traffic for threats and data exfiltration.


SASE vs SSE: What is Security Service Edge?

Security Service Edge (SSE) focuses on the security stack of SASE without the SD‑WAN element. SSE typically includes ZTNA, CASB, SWG and FWaaS delivered from the cloud. It is often the fastest path to modernise security for a distributed workforce when the underlying WAN is not being replaced.

  • Choose SSE when the priority is to standardise and uplift security controls for remote users, branches and cloud access, while keeping the existing WAN in place.
  • Choose SASE when you also want to modernise the WAN, consolidate providers and policies, and optimise performance end to end.


How SASE Works in Practice

  1. User or device connects from any location.
  2. Traffic is steered to the nearest point of presence for policy enforcement.
  3. Identity, device posture and context are evaluated.
  4. Security controls are applied: ZTNA for private apps, SWG and CASB for web and SaaS, FWaaS for general traffic.
  5. SD‑WAN selects the optimal path, delivering consistent performance and security.

This model removes unnecessary backhaul, improves visibility and simplifies operations with one policy plane.


Why Organisations Adopt SASE or SSE

  1. Consistent security everywhere: The same policies apply to users in the office, at home or on the move.
  2. Identity‑centric control: Policies follow users and devices, improving auditability and incident response.
  3. Better user experience: Local breakout and smart routing reduce latency and improve SaaS performance.
  4. Operational simplicity: Fewer point products, centralised policy and unified monitoring.
  5. Scalability and agility: Capacity and features scale as a service, not by installing new hardware.
  6. Stronger zero trust posture: Minimise implicit trust and reduce lateral movement.


Getting Started: Practical Steps

  1. Map use cases and traffic flows
    Identify who needs access to what, from where and on which devices. Prioritise high‑value applications and sensitive data.
  2. Establish identity and device health as gates
    Integrate identity providers and device management so that policy decisions consider user role and device posture.
  3. Start with SSE for quick wins
    Deploy ZTNA for private apps, SWG and CASB for web and SaaS, and FWaaS for consistent inspection. This can coexist with your current WAN.
  4. Plan SD‑WAN evolution
    When ready, add SD‑WAN to consolidate connectivity, improve performance and complete the SASE model.
  5. Consolidate vendors and policies
    Aim to reduce overlap and complexity. Fewer consoles and a single policy model make operations more effective.
  6. Measure and iterate
    Track user experience, incident rates and policy coverage. Use findings to refine posture and roadmap.


Common Pitfalls to Avoid

  1. Treating SASE as a product rather than an architecture and operating model.
  2. Lifting and shifting legacy allow‑all access instead of enforcing least privilege.
  3. Ignoring identity and device posture in policy decisions.
  4. Running overlapping tools without a plan to consolidate, which increases cost and weakens visibility.
  5. Neglecting change management and training, which are essential for adoption.


Talk to CyberLab

CyberLab helps organisations assess where SASE or SSE fits, design a pragmatic roadmap and implement the right controls at the right pace. If your team would like to explore options or validate your direction, we are available for a free initial consultation to discuss goals, constraints and next steps.

We help organisations work securely from anywhere, with security that is consistent, proportionate and easy to manage.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Vulnerability Assessment versus Penetration Test

Vulnerability Assessment vs Penetration Test: Key Differences Explained

What Is The Difference & When To Use Each?

CyberLab explains how Vulnerability Assessments (VAs) and Penetration Tests (Pen Tests) work, how they complement each other, and how to build a sensible testing cadence that fits risk and change.


Quick Summary

  • Vulnerability Assessment: Automated discovery of known weaknesses across systems and networks, producing a prioritised list to remediate. Fast coverage, broad visibility, highly repeatable.
  • Penetration Test: Expert‑led simulation that chains weaknesses to achieve realistic attack objectives, validating impact and controls. Deeper insight, business‑level risk narrative, targeted improvements.

Both are essential. A VA finds what is exposed. A Pen Test proves what is exploitable and why it matters.


What is a Vulnerability Assessment?

A Vulnerability Assessment actively scans internal and/or external infrastructure to identify known weaknesses that attackers could exploit. It is run against defined IP ranges or assets and produces a report with findings and remediation guidance.

Typical issues uncovered include:

  • Unpatched or end‑of‑life software
  • Misconfigured or exposed services and ports
  • Default or weak credentials (for example, admin/admin)
  • Insecure protocols and ciphers (for example, legacy TLS versions)

Where it helps most:

  • As the first step in a security testing journey, establishing a baseline quickly
  • As a regular control to catch drift from secure baselines, configuration errors and newly disclosed vulnerabilities

Cadence: Monthly or quarterly is common, depending on change rate and risk appetite. Remember that VAs, like Pen Tests, provide a point‑in‑time view, so frequency matters.

Beyond automation: While scanning is largely automated, experienced teams add value with context, open‑source intelligence (OSINT) where appropriate, and aftercare that helps teams interpret, prioritise and fix efficiently.

Learn More

What is a Penetration Test?

A Penetration Test goes further and deeper. It uses expert techniques to validate how vulnerabilities can be combined, exploited and escalated to achieve meaningful objectives.

Activities typically include:

  • Research and reconnaissance
  • Threat modelling and attack path analysis
  • Vulnerability exploitation and privilege escalation
  • Lateral movement and data access validation (within agreed scope)
  • Documentation of impact with an executive summary, attack narrative, and ranked remediation plan

Cadence: Often annual as a baseline, with additional testing after significant changes such as new remote access solutions, major application releases or compliance drivers. Pen Tests are more resource‑intensive and take longer than VAs, which is why a staged approach is effective.

Learn More

A Simple Analogy

Think of a network as a house.

  • A Vulnerability Assessment identifies weaknesses: a rusty lock, a half‑open window, a bin that could be used as a step.
  • A Penetration Test tries to chain these findings: test the lock, leverage the bin to reach the window, and prove whether a break‑in is possible.

Both insights are valuable. The VA shows where to improve. The Pen Test shows what really happens if issues are left unfixed.


Key Differences at a Glance

  • Depth vs breadth: VA prioritises coverage and speed, Pen Test prioritises depth and realism.
  • Automation vs expertise: VA is largely automated with expert interpretation, Pen Test is expert‑led throughout.
  • Outcome: VA provides a list of weaknesses to remediate, Pen Test provides validated attack paths, business impact and targeted fixes.
  • Frequency: VA more frequent to reduce exposure between changes, Pen Test periodic or change‑driven to validate resilience.


How They Work Together

  1. Start with a VA to remove the obvious and reduce the attack surface quickly.
  2. Follow with a Pen Test to validate critical paths, controls and detection/response.
  3. Repeat VAs regularly to catch configuration drift and new vulnerabilities.
  4. Trigger Pen Tests after major change or on a set cycle to keep assurance current.


What ‘Good’ Looks Like in the Reports

Vulnerability Assessment report:

  • Clear asset scope and scan coverage
  • Findings grouped and prioritised by severity, with fix guidance
  • Trends over time when assessments are run regularly

Penetration Test report:

  • Executive summary in business terms
  • Attack narrative that explains how access was achieved and what it enabled
  • Ranked vulnerabilities with technical detail and remediation steps
  • Evidence that supports replication and verification

Both are only worthwhile if the organisation acts on remediation and tracks closure.


Practical Testing Cadence

  • High change or internet‑facing assets: VA monthly, or more frequently for critical services
  • Broad internal estate: VA quarterly
  • Pen Test: annually as a baseline, plus after significant architectural or application change, or when required by regulation

Plan windows carefully. Automated scans can be “noisy” on the network, and some Pen Test activities may require coordination to avoid operational disruption.


Choosing a Trusted Provider

Look for independent, accredited testing delivered under strict NDAs and with clear separation from sales and implementation teams. Frameworks such as CREST help ensure quality, ethical practice and consistent methodology. Vendor‑agnostic reporting and unbiased recommendations support better decision‑making.


Getting Started

CyberLab helps organisations plan a sensible testing programme, starting with rapid visibility through a Vulnerability Assessment and moving to targeted Pen Testing that validates real‑world risk. The team can also support prioritised remediation and help embed repeatable processes so improvements stick.

To discuss scope, cadence and outcomes that fit your environment and risk profile, the CyberLab team is available for an initial consultation.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Protect Everything with Microsoft

Protect Everything with Microsoft Using Built‑In Security and Controls

Safeguarding Your Digital Assets in an AI-Driven World

Discover the key takeaways from the Securetour 2023 session “Protect Everything With Microsoft” as we delve into the wide range of comprehensive solutions and strategies provided by Microsoft. Explore how these offerings can safeguard and fortify your valuable digital assets in today’s interconnected landscape.

This article covers:

  • Understanding the Cyber Security Landscape
  • Microsoft’s Comprehensive Security Solutions

Securetour, the virtual cyber security event, brought together industry experts to share valuable insights and strategies for fortifying digital defences. In one of the sessions, Damian Andrews from CyberLab and Jon Davies from Microsoft (MS Link) shed light on the importance of robust cybersecurity measures and how organisations can benefit from Microsoft’s comprehensive security solutions.

This blog post explores the key takeaways from their session and highlights the role of Chess ICT and CyberLab in helping organisations strengthen their cybersecurity posture.


Understanding the Cyber Security Landscape

Cyber threats are more sophisticated than ever, driven by AI-powered attack vectors, deepfake phishing, and supply chain vulnerabilities.

Damian Andrews, Security Consultant at CyberLab, emphasised during SecureTour 2025 that organisations must adopt proactive, layered defence strategies to protect sensitive data, infrastructure, and intellectual property.


Microsoft’s Secure Future Initiative and AI-Driven Security

Jon Davies, Chief Security Advisor at Microsoft, outlined how Microsoft’s Secure Future Initiative (SFI) is transforming cybersecurity through AI-first principles and Zero Trust architecture. [microsoft.com], [microsoft.com], [microsoft.com]

Key Components of Microsoft’s Security Ecosystem:

  • Threat Protection & Detection: Microsoft Defender and Security Copilot use AI and behavioural analytics to detect and respond to threats in real time. [microsoft.com]
  • Identity & Access Management: Azure Active Directory (now Microsoft Entra ID) enforces multifactor authentication, conditional access, and identity governance to prevent unauthorised access. [microsoft.com]
  • Data Protection & Compliance: Microsoft Purview and Information Protection tools help classify, label, and secure sensitive data across hybrid environments. [microsoft.com]
  • Cloud Security: Azure’s built-in security controls, combined with Microsoft Defender for Cloud, provide visibility and protection across workloads, endpoints, and cloud services.

Tales from the CyberLab: Adopting Microsoft Copilot Securely Explained with Chess


CyberLab’s Role in Strengthening Defences

CyberLab continues to be a trusted partner in helping organisations implement Microsoft’s security solutions effectively. At SecureTour 2025, CyberLab showcased real-world attack simulations, incident response strategies, and AI-driven threat detection.

CyberLab Services:

  • Security Consultancy: Tailored assessments and implementation support for Microsoft security tools.
  • Security Awareness Training: Programmes to build a cyber-aware workforce.
  • Managed Security Services: 24/7 monitoring, incident response, and continuous improvement.

CyberLab’s MDR service now integrates natively with Microsoft 365, Azure, and Intune, ingesting telemetry from Exchange Online, Teams, SharePoint, and Entra ID to detect phishing, MFA bypass attempts, and suspicious inbox rules.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Security for Small and Medium-Sized Enterprises

Cyber Security for Small and Medium-Sized Enterprises (SME's)

Five Cyber Security Essentials Every SME Needs in 2025

In today’s digital-first economy, SMEs face increasing cyber risks – from phishing and ransomware to insider threats and misconfigured systems.

With 43% of UK businesses reporting cyber incidents in the past year and SMEs accounting for over £3.4 billion in losses annually, robust cyber security is no longer optional – it’s essential for survival.

While achieving “cyber security nirvana” may be unrealistic, SMEs can build layered defences that offer confidence and resilience against evolving threats.


Tales from the CyberLab: Cyber Crime for SME’s Explained


The Five Essentials for SME Cyber Security

1. Next-Generation Endpoint Protection

Traditional antivirus tools are no longer sufficient. SMEs should invest in modern endpoint protection that uses behavioural analysis to detect threats—even those not yet catalogued. These solutions monitor suspicious activity and respond in real time, offering proactive defence against ransomware and malware.

2. Patching and Vulnerability Management

Unpatched software remains one of the most exploited attack vectors. With Cyber Essentials v3.2 now requiring patches within 14 days for high-severity vulnerabilities, SMEs must implement automated patching and maintain visibility across their IT estate.

3. Security Awareness Training

Human error is a leading cause of breaches. Regular training helps employees spot phishing attempts, use strong passwords, and follow secure practices. Simulated phishing campaigns and interactive modules can dramatically reduce risk.

4. Modern Firewalls

Next-generation firewalls offer dynamic threat detection, application-aware filtering, and integration with endpoint tools. These systems adapt to changing network behaviours and reduce manual rule management, making them ideal for SMEs with limited IT resources.

5. Disaster Recovery Planning

A well-tested disaster recovery (DR) plan is critical. SMEs should identify business-critical systems, define recovery time objectives (RTOs), and choose appropriate backup technologies. Regular testing ensures that recovery procedures are effective and actionable when needed.


Bonus: Test Everything

Security tools are only effective if properly configured. SMEs should conduct regular penetration testing, phishing simulations, and DR drills to validate their defences and uncover gaps before attackers do.


Certification Matters

Cyber Essentials and Cyber Essentials Plus remain vital for SMEs seeking to demonstrate baseline security and win public sector contracts. The 2025 updates emphasise cloud security, BYOD coverage, and stricter patching timelines.

Get Cyber Essentials

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

How To Recover From a Cyber Attack

How To Recover From a Cyber Attack: Steps to Bounce Back Stronger

Building a Resilient Recovery Strategy for 2025 and Beyond

Gavin Wood, CyberLab CEO, summarises how to recover from a cyber attack and advises how to create your disaster recovery plan.

He covers:

  • Introduction to Cyber Disaster Recovery
  • Creating your Disaster Recovery Plan
  • Regular Testing


Creating an Effective Disaster Recovery Plan

A robust DR plan should include:

  • Infrastructure Visibility: Know your estate – if you can’t see it, you can’t recover it.
  • Impact Assessment: Evaluate the business impact of losing access to each system.
  • Prioritisation: Identify mission-critical systems and define Recovery Time Objectives (RTOs).
  • Technology Selection: Choose appropriate DR technologies, from real-time replication to secure offsite backups.
  • Policy & Governance: Document procedures, assign roles, and ensure accessibility of the plan- even during a crisis.


Regular Testing: The Key to Confidence

Testing is the only way to validate a DR plan. Organisations must go beyond checking backup logs – full restoration drills are essential. Early failures during testing are expected and valuable, helping refine procedures and improve resilience.

As highlighted by the Gloucester Council incident, where systems remained offline for nearly ten months, the cost of inadequate recovery planning can be severe – impacting reputation, revenue, and public trust.


Rapid Recovery Is Now a Strategic Differentiator

Speed is critical. In 2025, businesses that recover quickly from cyber incidents will retain customers and avoid regulatory penalties. Modern DR strategies must integrate cyber resilience, including:

  • Immutable backups
  • Automated failover systems
  • Real-time monitoring
  • Isolated recovery environments for forensic analysis


Tales from the CyberLab: Ransomware Response Explained


Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Quick Wins to be Cyber Secure

Quick Wins to be Cyber Secure: Five Fast Fixes Every Business Should Use

Five Fast Fixes to Strengthen Your Business Against Cyber Threats

Cyber security can feel overwhelming, especially for small and medium-sized enterprises (SMEs) with limited resources.

But there are simple, high-impact actions that can dramatically improve your organisation’s security posture. David Dixon, Security Testing Pre-Sales Consultant at CyberLab, outlines five practical steps every business should take.


Mobile Device Management

Smartphones and tablets often access sensitive business data but operate outside the safety of office networks.

SMEs should:

  • Identify what data mobile devices can access (e.g. email, Teams, OneDrive).
  • Use mobile device management (MDM) tools like Microsoft Intune or Sophos Mobile to control access and enforce security policies.
  • Ensure devices are encrypted, password-protected, and remotely wipeable.


Email Security

Phishing remains the most common attack vector for UK SMEs.

To reduce risk:

  • Apply the principle of least privilege – limit account access to only what’s necessary.
  • Train staff to spot phishing signs: suspicious links, urgent language, poor grammar, and unexpected attachments.
  • Implement a clear reporting process for suspected phishing emails.
  • Use tools like Microsoft 365’s Phishing Investigation feature to automate detection and response.


Keep Systems Up to Date

Unpatched software is a major vulnerability.

SMEs should:

  • Maintain an inventory of devices and software.
  • Enable automatic updates and apply patches within 14 days of release.
  • Monitor for end-of-support products and replace them promptly.
  • Use vulnerability scanning tools to identify gaps missed by manual checks.


Passwords and Authentication

Weak passwords are a top concern for SMEs in 2025.

Strengthen access controls by:

  • Enforcing multi-factor authentication (MFA) for all users, especially admins.
  • Providing password managers to help staff create and store strong credentials.
  • Avoiding frequent forced password changes – only reset when compromise is suspected.
  • Monitoring for compromised credentials on the dark web using services like HackRisk.


Cyber Awareness

Technology alone isn’t enough – your people must be trained to use it securely.

Build a strong security culture by:

  • Offering regular awareness training and phishing simulations.
  • Encouraging prompt reporting of incidents without fear of punishment.
  • Making security part of everyday conversations, not just IT’s responsibility.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation