Managing Cyber Risks

Managing Cyber Risks: Effective Strategies for Stronger Resilience

Risk Management in Cyber Security

Our host explains what risk management is and why it is important for businesses that are looking to increase their cyber security.

Topics include:

  • What is cyber risk management?
  • Five steps of Cyber Risk Management


What is Cyber Risk Management?

Cyber risk management has, for the most part, always been an element of any businesses risk strategy or management plan. Historically this was a case of making sure we were safe from Denial-of-Service attacks or disruptive/malicious software threats.

Today however the risks that businesses face in the digital workspace are both legion in number and variety; and the intent behind them is different. The impact they have on our business has similarly changed, it is no longer about causing a nuisance and/or disrupting the operation of a business and the services it offers.

Cyber risk management is now about taking a much more focussed approach on the risks posed by todays (and tomorrows) cyber threats; this means understanding and prioritising the types of cyber threat that are most relevant to your business, determining the magnitude of the impact they could have on your ability to work and trade normally, and developing/implementing solutions and countermeasures to mitigate those risks.

Five Steps of Cyber Risk Management

Identifying Risks

This involves assessing your systems, processes, and data to identify potential vulnerabilities and threats.

The first step to identifying risks to your business is to understand the mission-critical areas of your digital environment.

Key questions to identify these are: 

  • Which servers and/or services are critical to your ability to support business as usual operation?
  • What would be the impact on your business if these critical elements were unavailable?

Assessing the Likelihood & Impact

Once potential risks have been identified, the next step is evaluating the likelihood of each risk occurring and what potential impact on the organisation if it does occur.

The financial risks to a business today are without doubt the elephant in the room, they are often intangible and very difficult to measure, it’s easy to dismiss expensive cyber security solutions and “run the risk” of a significant cyber incident not happening – every day organisations discover that hard way that the financial risks they thought were acceptable turn out to be orders of magnitude higher than they anticipated.

Of course, not every cyber security ‘incident’ is apocalyptic in nature but there are some that are, and their ramifications need to be understood to the greatest extent possible.

Prioritising Risks

Based on the likelihood and impact of each risk, the organization should prioritize the risks that need to be addressed first. Don’t waste time on risks that are not credible at the expense of those that are. A key consideration for prioritising risk is asking how long could you sustain operations if one or more of these systems were lost?

Using a risk assessment framework is one of the best ways to prioritise the risks that have been identified. There are numerous frameworks freely available that assess risks using different approaches, its often a good idea to assess the same risks in different ways and compare the results to help you understand the severity of the risk to you; risks identified as concerns by both are a safe starting point as to where your priorities lie.

Implementing Controls

Businesses should implement proper controls to mitigate or eliminate the risks identified. These controls can include technical solutions such as firewalls and antivirus software, as well as policies and procedures to improve security awareness and incident response.

Consider how changing the way you operate might affect the risks you have identified, can small process changes or introducing security features of your existing solutions – such as encryption of data at rest – mitigate or eliminate the risks you have identified for little or no cost?

Monitoring and Reviewing

For most effective risk management, businesses need to be continuously monitoring their systems and processes. This is key to ensuring that the cyber security controls that have been implemented are effective and that new risks are identified and dealt with.


Conclusion

Many of us are only conducting perfunctory cyber risk assessments and we would greatly benefit from adjusting our approach, Gartner’s studies have led them to the same conclusion…

…by 2025, 60% of organizations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements.”

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

CyberLab Working

Five Essential Cyber Security Measures: Practical Cyber Security Tips

Practical Cyber Security Tips Every Small Business Should Know

With the increasing frequency and sophistication of cyber attacks, it is crucial for SMEs to adopt robust cyber security practices to safeguard their business and data.

This blog focuses on essential cyber security best practices tailored for SMEs, highlighting key resources and actionable steps to protect your business.


Cyber Security Best Practices for SMEs

Implementing effective cyber security measures doesn’t require a massive budget or extensive expertise.

Employee Training and Awareness

Educate your staff about common cyber threats such as phishing, malware, and social engineering. Regular training sessions can help employees recognise and avoid potential security risks.

Strong Password Policies

Encourage the use of strong, unique passwords for all accounts. Implement multi-factor authentication (MFA) wherever possible to add an extra layer of security.
Regular Software Updates: Keep all software, including operating systems and applications, up to date with the latest security patches. Regular updates help protect against known vulnerabilities.

Data Encryption

Encrypt sensitive data both in transit and at rest. This ensures that even if data is intercepted or accessed without authorisation, it remains unreadable.

Backup and Recovery Plans

Regularly back up your data and ensure that backups are stored securely. Test your recovery plan to ensure that you can quickly restore operations in the event of a cyber incident.

Gain Cyber Essentials

Achieving Cyber Essentials certification demonstrates your commitment to cyber security and provides a solid foundation for your security practices.


Understanding Cyber Essentials

Cyber Essentials is a UK government-backed certification scheme led by IASME, designed to help organisations of all sizes protect against common online threats.

The scheme covers five key areas:

  • Firewalls and Internet Gateways: Implementing firewalls to secure your internet connection.
  • Secure Configuration: Ensuring that systems are configured securely to reduce vulnerabilities.
  • Access Control: Managing user access to data and services to minimise risk.
  • Malware Protection: Installing and maintaining anti-malware solutions.
  • Patch Management: Keeping software up to date with the latest security patches.

By adhering to these principles, SMEs can significantly reduce their risk of cyber attacks and improve their overall security posture.

Get Cyber Essentials

Actionable Steps for SMEs

Here are additional steps small businesses can take to protect themselves from cyber threats.

Conduct Regular Security Audits

Periodically review your organisation’s security posture, taking a holistic approach that assesses to identify and address any vulnerabilities or gaps. There are several, open-source industry standards and security frameworks available online that organisations, including SMEs, can align to such as NISTCIS Critical Security Controls SME Companion, and NCSC. CIS even offers a free Controls Self-Assessment Tool (CIS CSAT) to help you get started.

Vulnerability Management

Regularly identify, assess, and mitigate vulnerabilities in your systems. Using Cyber Security as a Service (CSaaS) solutions, such as HackRisk, can help you stay on top of vulnerabilities without the need for a dedicated in-house team

Develop an Incident Response Plan

Prepare for potential security incidents by creating a response plan. Outline procedures for detecting, responding to, and recovering from cyber-attacks. Sophos offers a free incident response planning guide which can be downloaded here.

Utilise Cloud Security Solutions

Many cloud service providers offer robust security features that can help SMEs protect their data and applications.

Outsource to Experts

If maintaining an in-house cyber security team is not feasible, consider outsourcing to a dedicated team of experts. Services such as those offered by Sophos provide ongoing support and incident response capabilities, alleviating some of the cost and resource burdens.

Communication Protocols

Establish clear protocols for communicating internally and externally during a security incident. This ensures that information is disseminated quickly and accurately, minimising confusion and mitigating damage.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Cyber Security Essentials for Websites and Applications

Cyber Security Essentials for Websites and Applications: Safeguarding E-Commerce

Safeguarding E-Commerce Success

With e-commerce thriving as a cornerstone of retail, securing websites and applications has never been more critical. Cyber criminals target vulnerabilities in commercial platforms and websites to exploit sensitive customer data and disrupt operations.

This month, we explore the cyber threats and implications facing online retail and e-commerce, as well as delving into some best practices and frameworks like OWASP, and secure development methodologies, to help organisations stay secure online.


Why Application Security Matters for E-Commerce

Threat Landscape

Cyber crime targeting e-commerce platforms remains a top concern, according to the NCSC, 50% of UK businesses experienced a cyber attack in 2023 alone. 18% of breaches that were reported in 2023 to the Information Commissioner’s Office (ICO) were in the retail sector.

Rising Threats

Cyber crime targeting online businesses in the UK is being driven by increasingly sophisticated attacks, with the number of affected businesses only set to increase year on year. Common threats include SQL injection, cross-site scripting (XSS), and API breaches.

Impact

A single breach can result in financial loss, reputational damage, and even regulatory penalties. For example, Magecart’s attacks on British Airways showcased the devastating impact of compromised third-party integrations, resulting in the flag carrier airline having to pay a £20m data protection fine. [source: The Register]

Trust and Loyalty

Ensuring robust security builds customer trust, enhances brand reputation, and protects critical data like payment information and personal details.


The Rise of API Breaches and the Importance of Secure Third-Party Integrations

APIs (Application Programming Interfaces) are the backbone of modern web applications, enabling integration between systems, other applications, and services. According to Business Wire, a survey in 2022 found that 97% of enterprise business leaders agree that successfully executing an API strategy is essential to secure organisations’ future revenue and growth.

However, their rapid adoption has also made them a prime target for attackers. In 2021, Gartner predicted that APIs would become the top attack vector used to target applications.

Fast forward to 2024 and there have already been some notable breaches…

Peloton API Breach (2021)

Hackers exploited a vulnerability in Peloton’s API that enabled users to make an unauthenticated request for account data to the API without the API first verifying if that user has authorisation to access said data.

The API enables the end users’ bikes to capture and upload data back to Peloton’s servers. Sensitive user data for around 3 million individuals was exposed due to insecure API configurations.

This included personal details such as names, emails, and workout statistics. Peloton’s inadequate authentication and authorisation measures highlighted the critical need for robust API security protocols. [source: Threatpost]

Facebook Data Breach (2021)

An API misconfiguration in Facebook’s (Meta’s) contact importer feature was exploited by malicious actors, exposing the personal data of approximately 533 million users from 106 countries.

Personal data such as phone numbers, full names, and locations were leaked, with the issue originally stemming from scraping public profiles before the vulnerability was patched in 2019. [source: Twingate]


Tales from the CyberLab: Cyber Security for Websites & Apps Explained


Best Practices for Web Application Security

Penetration Testing

Penetration testing is a cornerstone of application security, especially for retail and e-commerce businesses handling vast amounts sensitive customer data and requiring 24/7 availability online.

While large enterprises like Amazon may have the capacity to conduct internal pen testing, most organisations in this space face cost and resource constraints that make outsourcing these services more practical and effective. Partnering with external cyber security experts provides access to specialised skills, tools, and up-to-date threat intelligence that many internal teams simply can’t maintain.

Moreover, hiring third-party testers eliminates the bias that might come with in-house testing and ensures that vulnerabilities are approached with a fresh perspective. The cost of penetration testing is often outweighed by the potential financial and reputational damage of a breach, particularly in high-stakes industries like retail.

Independent testing not only provides peace of mind but also aligns with compliance requirements and industry best practices, ensuring businesses are well-protected against the ever-evolving threat landscape.

Code Reviews

Code reviews are an essential part of any secure development process, ensuring that security vulnerabilities are caught early in the development lifecycle. This practice involves systematically examining source code to identify flaws, errors, or opportunities for improvement, with a strong focus on maintaining high security standards.

For retail and e-commerce businesses, where customer trust is paramount, code reviews play a vital role in protecting sensitive user data and ensuring seamless functionality. Conducting thorough code reviews:

  • Identifies Common Vulnerabilities: Helps uncover issues such as injection flaws, insecure data handling, and authentication weaknesses, which align with risks highlighted in the OWASP Top 10.
  • Enhances Collaboration: Encourages teamwork among developers, fostering a culture of accountability and shared responsibility for secure coding practices.
  • Reduces Costs: Fixing security vulnerabilities during development is significantly less expensive than addressing them after deployment or following a breach.

Given the fast pace of the e-commerce sector, it may be tempting to bypass code reviews to save time. However, the long-term risks far outweigh the short-term gains. Engaging third-party experts or employing tools like static application security testing (SAST) solutions can streamline this process, providing an additional layer of confidence before your code goes live.

Ultimately, code reviews are more than just a quality check – they are a proactive defence against cyber threats, reinforcing the integrity of your applications from the very foundation.


Open Web Application Security Project (OWASP)

Top 10 Vulnerabilities

OWASP (Open Web Application Security Project) offers a globally recognised framework for understanding the most common and prevalent risks facing open web and mobile applications.

Here’s a snapshot of the OWASP Top 10 vulnerabilities every e-commerce platform must address:

  1. Broken Access Control: Unrestricted access to sensitive functionalities or files.
  2. Cryptographic Failures: Insufficient cryptographic mechanisms leading to compromise of sensitive data.
  3. Injection: Exploiting input fields to manipulate databases or applications (e.g., SQL Injection).
  4. Insecure Design: A broad category representing different weaknesses, expressed as “missing or ineffective control design”.
  5. Security Misconfiguration: Default settings or unpatched software creating vulnerabilities.
  6. Vulnerable and Outdated Components: Relying on outdated libraries and frameworks, or application technologies with known vulnerabilities.
  7. Identification and Authentication Failures: Weak authentication and authorisation processes enabling unauthorised access.
  8. Software and Data Integrity Failures: Code and infrastructure that does not sufficiently protect against integrity violations
  9. Security Logging and Monitoring Failures: Insufficient logging, detection, monitoring, and active response, enabling unnoticed breaches. The application cannot detect, escalate, or alert for active attacks in real-time or near real-time.
  10. Server-Side Request Forgery (SSRF): SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL). This is increasingly common in modern web applications.


Secure Development Life Cycle (SDLC)

SDLC emphasises embedding security into every stage of the development process, from ideation to deployment. Key steps include:

  • Planning: Identify security requirements early.
  • Design: Threat modelling to anticipate potential attack vectors.
  • Implementation: Use secure coding practices and tools to detect vulnerabilities in real time.
  • Testing: Conduct automated and manual tests, including code reviews and penetration testing.
  • Deployment: Monitor applications continuously and ensure robust change management.
  • Maintenance: Regularly update, patch, and audit systems post-launch.

More information about SDLC practices can be found here.

Tools and Resources for Strengthening Security

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Your Security Questions Answered

Your Cyber Security Questions Answered: Questions Every Business & IT Leader Asks

Top Questions Every Business & IT Leader Asks

Security is now a core business risk, not just an IT concern.

Cloud adoption, hybrid work and a fast‑moving threat landscape mean leaders need simple, practical answers to three recurring questions:

  • Has security really changed that much in the past few years?
  • Am I using the best‑in‑class security vendors today?
  • Do I have the right skills and time in‑house to manage these solutions?

CyberLab addresses each question and outlines a pragmatic way forward.


Has Security Really Changed That Much?

Yes. The perimeter has shifted, and so have attacker methods and business expectations.

  • Hybrid work and SaaS sprawl
    People, devices and data now operate beyond the office. Access happens from anywhere, often to third‑party applications. Security must follow identity and data, not only networks.
  • Identity is the new control point
    Strong authentication, conditional access and least privilege are now essential. Compromised credentials remain one of the most common root causes of incidents.
  • Cloud as default
    Security needs to be built for cloud platforms and APIs. Posture management, workload protection and secure configuration now sit alongside traditional controls.
  • Detection, response and resilience
    Prevention is vital, but it is not enough on its own. Organisations need visibility, rapid response and tested recovery. Backups, restore testing and incident playbooks are part of core security.
  • Supply chain and third parties
    Vendors, partners and integrators can introduce risk. Contracts, minimum controls and periodic assurance need to be part of the operating model.

The model to aim for is identity‑first, least privilege, assume breach, with layered controls that prevent, detect, respond and recover.


Are We Using Best‑In‑Class Security Vendors Today?

“Best” depends on outcomes, integration and operational fit, not just features. Many estates grew into a patchwork of point products. Consolidation around fewer, well‑integrated platforms often improves security and reduces effort.

What good looks like in a modern stack

  • Identity and access
    Enterprise identity provider, phishing‑resistant MFA, conditional access, privileged access management, lifecycle governance.
  • Endpoint and server security
    EDR or XDR with behaviour‑based detection, central policy, and response tooling. Coverage for Windows, macOS, Linux and mobile.
  • Email, web and DNS security
    Advanced phishing protection, attachment sandboxing, impersonation and brand spoofing controls, safe link handling and DNS filtering.
  • Cloud and SaaS posture
    Cloud security posture management for IaaS and PaaS, and configuration governance for SaaS. Guardrails and continuous checks.
  • Network security
    Secure web gateway, ZTNA for private apps, and segmentation. Where appropriate, an SSE or SASE approach to apply consistent policy from anywhere.
  • Data protection and backup
    Classification, DLP, encryption and secure, isolated backups with regular restore tests.
  • Vulnerability and patch management
    Accurate asset inventory, regular scanning, prioritised remediation and clear service levels.
  • Logging and monitoring
    Centralised log collection, correlation, detection content mapped to common frameworks, and alert triage.

Selection principles that help

  • Prioritise integration and coverage over feature checklists.
  • Favour open standards and proven interoperability.
  • Demand outcome measures, not only demos.
  • Consider operational cost. The best tool is one the team can run well.

Common anti‑patterns to avoid

  • Buying duplicate tools that overlap.
  • Deploying without hardening defaults.
  • Ignoring decommissioning, leaving legacy exposure.
  • Running security in silos that do not share telemetry or policy.


Do We Have The Right Skills And Time In‑House?

Many incidents are caused by misconfiguration rather than missing tools. Operating security well is a discipline that combines people, process and technology.

Operate to a plan, not heroics

  • Define standards and baselines for identity, endpoint, cloud and data.
  • Use automation for onboarding, patching, certificate and key management.
  • Maintain runbooks and playbooks for detection and response.
  • Track metrics such as mean time to detect and recover, patch compliance and simulation results.

When to consider managed services

  • You need 24×7 detection and response but cannot staff it continuously.
  • You want co‑managed operations, where a partner handles monitoring and escalation while your team owns design decisions.
  • You have gaps in specialist skills such as cloud security engineering, incident response or penetration testing.

Roles and responsibilities that matter

  • Risk owner to align controls with business priorities.
  • Security engineering to design and harden platforms.
  • Operations for monitoring, patching and access governance.
  • Incident response with clear authority to act.


Building an In-House Security Team vs Outsourced Security Support


A Practical 90‑Day Action Plan

  • Baseline your posture
    Inventory identities, devices, critical apps, internet‑facing assets and third parties.
  • Close the high‑impact gaps
    Enforce MFA everywhere feasible. Disable legacy protocols. Review and tighten privileged access.
  • Harden endpoints
    Deploy EDR or XDR to all supported devices. Remove unsupported operating systems where possible.
  • Improve email defences
    Enable advanced phishing controls. Publish and monitor SPF, DKIM and DMARC with alignment.
  • Patch with purpose
    Implement a clear patch cadence and fast‑track critical updates for internet‑facing systems.
  • Secure backups and test restores
    Maintain immutable or isolated copies. Prove you can restore key services within business‑agreed times.
  • Scan for vulnerabilities
    Run internal and external scans. Prioritise based on exploitability and business impact.
  • Strengthen cloud configuration
    Apply baseline policies, guardrails and automated checks in cloud platforms and key SaaS.
  • Train and test people
    Short, regular awareness modules and varied phishing simulations with friendly feedback and easy reporting.
  • Prepare to respond
    Document playbooks, define roles and run a tabletop exercise for a realistic scenario such as business email compromise.


How CyberLab Helps

CyberLab supports organisations with a practical, outcome‑focused approach:

  • Posture assessments and roadmaps aligned to recognised frameworks.
  • Testing and assurance including vulnerability assessments and penetration tests by accredited specialists.
  • Managed detection and response with actionable reporting and co‑managed models.
  • Identity, email and endpoint hardening to raise the baseline quickly.
  • Awareness and simulation programmes that build positive security culture.
  • Certification support for standards such as Cyber Essentials and similar schemes.

If your organisation would like a clear view of current risk and a right‑sized plan to improve, we are available for an initial discussion to align goals, constraints and next steps.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

The True Cost of a Cyber Incident and How It Impacts Your Business

Security Lessons from M&S, Co-op, and Jaguar Land Rover

Data breaches remain one of the most expensive risks organisations face today. IBM’s latest Cost of a Data Breach Report reveals that the global average cost has reached $4.44 million. Though, for the first time in five years, that figure is trending downward thanks to faster containment driven by AI-powered defences.

Closer to home, the United Kingdom sits near the global average, with the typical breach costing £3.29 million (around $4.14 million).

These numbers are more than statistics. They highlight why robust security strategies, rapid response capabilities, and investment in advanced technologies are essential.

In this edition, we explore the trends shaping cyber security and what they mean for your organisation. One thing is clear: the cost of inaction is far greater than the cost of prevention.


The High Price of Disruption: Recent UK Case Studies

Jaguar Land Rover: The Most Expensive Cyber Attack in UK History

In late August, Jaguar Land Rover (JLR) suffered a crippling cyber attack that forced a month-long shutdown of its internal systems and production lines. The estimated cost? At least £1.9 billion ($2.5 billion), making it the most economically damaging cyber event ever recorded in the UK.

The attack halted production at multiple sites, affected over 5,000 organisations in the supply chain, and required a £1.5 billion government loan guarantee to stabilise operations.

JLR’s wholesale deliveries dropped nearly 25% year-on-year, and the full recovery is not expected until early 2026. Analysts estimate JLR was losing around £50 million per week during the shutdown. (source: BBC)

 

Marks & Spencer and Co-op: Retailers Under Siege

Earlier this year, Marks & Spencer (M&S) and Co-op were hit by cyber-attacks that, while less costly than JLR’s, still resulted in staggering losses. The M&S breach, which shut down online services for two months, is estimated to have cost the retailer £300 million. (source: Sky News)

The attack exploited social engineering tactics, manipulating IT helpdesk staff into resetting passwords and bypassing security controls. Co-op and Harrods also suffered significant incidents, with the combined financial impact of the retail sector attacks estimated between £270 million and £440 million. (source: msn.com)


Why Are the Costs So High?

Operational Downtime: For JLR, every day of halted production meant lost vehicle sales, supply chain disruption, and financial strain on thousands of partner businesses.

Supply Chain Ripple Effects: The JLR attack affected over 5,000 organisations, with some suppliers facing collapse due to delayed or cancelled orders.

Reputational Damage: Retailers like M&S faced public scrutiny, parliamentary investigations, and the need to sever long-standing IT partnerships in the wake of the breach.

Regulatory and Legal Costs: UK GDPR and Data Protection Act violations can result in fines up to £17.6 million or 4% of global turnover, not to mention the cost of remediation and customer notification.


Lessons Learned: What These Incidents Teach Us

Cyber Security is Economic Security

As highlighted by the National Cyber Security Centre (NCSC), the scale of these incidents means that cyber resilience is now a matter of national economic security, not just IT hygiene. With 4 major incidents being reported per day in the UK, and a 50% increase from last year in ‘nationally significant’ attacks, UK businesses that fail to prepare for such events risk putting serious strain on the nation’s economy and increase our collective exposure to such events. (source: NCSC)

“Improving cyber resilience is a shared responsibility. Government, businesses, and service providers each have a role to play.”

– Gavin Wood, CEO

Attackers Exploit the Basics

Many breaches still begin with social engineering, weak access controls, or poor digital hygiene. This serves as a reminder that foundational security practices remain critical.

Preparation and Response Matter

The ability to rapidly detect, contain, and recover from incidents can dramatically reduce costs. Incident response retainers and robust playbooks are essential investments.


Best Practices for Mitigating the Cost of a Breach

No organisation is immune to cyber incidents or data breaches. Experiencing one is a matter of when, not if. While absolute, around-the-clock security appears unattainable in a constantly evolving threat landscape, adopting proven best practices can make a significant difference. By implementing these steps below businesses and organisations can greatly reduce the impact and financial burden of inevitable cyber events:

Invest in Resilience

Regularly review and test incident response plans. Ensure board-level oversight of cyber risk.

Implement Multi-Factor Authentication (MFA)

Require MFA or two-factor authentication (2FA) for all users, especially for accessing sensitive systems, to provide a crucial layer of security beyond the password.

Supply Chain Security

Assess and support the cyber resilience of key suppliers. Proactively manage your third-party risk, monitor vendor posture, and strengthen your supply chain security with HackRisk’s Supply Chain Security tools.

Cyber Insurance

While insurance can offset some costs, most policies only cover a portion of total losses. Understand your coverage and its limitations.

Continuous Dark Web Monitoring

Employ tools or services such as HackRisk AI to monitor for compromised credentials on the dark web, allowing for swift response if employee or organisational data is found in breach dumps.

Comprehensive Staff Training

Deliver regular cyber security awareness training for all employees, with a focus on recognising phishing attempts, the importance of password hygiene, and how to respond to suspicious activity.

Ongoing Policy Review and Enforcement

Routinely review and update password and authentication policies to adapt to emerging threats and ensure enforcement with automated checks wherever possible.


Final Thoughts: Reducing Risk

The financial consequences of a cyber incident can be devastating and, in some cases, fatal for organisations, as demonstrated by the experiences of companies such as JLR, M&S, and Co-op. These cases underscore how quickly costs can escalate, cascading far beyond initial estimates and affecting multiple facets of a business.

Given the severity of potential losses, it is essential for organisations to recognise cyber security as an integral business risk in order to preserve not just brand and reputation but ultimately business survival.

Treating cyber security with the same level of attention as other core business risks ensures that appropriate resources are allocated to mitigation and preparedness, potentially reducing the harm caused by cyber incidents and also the penalties or fines that may be imposed.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Important Contracting Company Update: Legal Entity Name Change

Changes to your Contracting Company

We’re making changes to your contracting company.

This transition is part of our ongoing commitment to making life easier for our customers and our people, and reflects our values of simplicity, quality, and passion.


What is changing?

From 2 January 2026, if your contracting company is currently Armadillo Sec Limited or Cyberlab Consulting Limited, this will change. From this date, all quotes will be issued from Chess Cybersecurity Limited (company number 02962709).

On the 1 July 2026, Chess Cybersecurity Limited will change its name to CyberLab Security Limited.

These changes will not affect our standard terms and conditions, pricing, or the level of service you receive.


What do you need to do?

You will need to onboard Chess Cybersecurity as a supplier, with the bank details listed above. If you already have Chess Cybersecurity onboarded as a supplier, no further action is required.

Our team is here to support you with any questions or additional fraud checks you may require.

You can contact your Sales Account Manager, or reach our Finance Team on 0333 050 8120 (Option 3) or at [email protected].


Understanding Incident Management

Understanding Incident Management: Your Cyber Safety Net

Incident Response Essentials for Every Team

The importance of safeguarding your organisation’s assets, brand, and reputation against cyber threats cannot be overstated, and so goes the saying “prevention is always cheaper than the cure”, but what about when the worst has already happened?

This month we are focusing on Incident Response, which is often shortened to IR and is a part of Incident Management. We’re deep diving into IR services, and why all organisations need access to IR expertise and support. Discover how to contain and put out the fires that cyber incidents inevitably create with practical strategies for strengthening your organisation’s cyber safety net.


What is Incident Response?

Incident response is a structured approach to addressing and managing the immediate aftermath of a cyber attack or data breach. The incident response process often involves various stages including detection, containment, eradication, remediation, recovery, and lessons learned.

Tales from the CyberLab: Ransomware Response Explained


Incident Response Retainers: Are They Really Necessary?

Incident response retainer services offer organisations proactive support and expertise in handling cyber incidents effectively. These retainer services provide organisations with access to a team of dedicated cyber security professionals who can rapidly respond to incidents when needed. These experts conduct forensic investigations, compromise assessments, and other critical tasks to minimise potential damage and mitigate risks. Additionally, they may offer guidance on handling fallout and media coverage of incidents, ensuring that organisations maintain transparency and effectively manage public perception.

While incident response retainers may initially seem like an additional expense burdening already stringent budgets, their value cannot be overstated. In fact, investing in an incident response retainer can potentially save organisations from incurring staggering costs in the aftermath of a cyber attack.

The reality is that cyber threats are becoming increasingly sophisticated and pervasive, making it not a matter of if, but when, an organisation will face a cyber incident. When such incidents occur, the financial and reputational consequences can be devastating. From the costs associated with downtime, data loss, and recovery efforts to the damage inflicted on brand reputation and customer trust, the fallout of a cyber-attack can be significant.

Furthermore, as we touched on in Reducing Your Cyber Insurance Premiums blog, having an incident response retainer in place can also demonstrate to cyber insurance providers that the organisation is taking proactive steps to manage and mitigate cyber risks, potentially leading to reduced insurance premiums. In essence, incident response retainers serve as a crucial safety net, offering peace of mind and financial protection in the face of evolving cyber threats.


Fail to Prepare; Prepare to Fail

Real-world incidents serve as poignant reminders of the critical importance of robust incident response capabilities. Take, for instance, the notorious NotPetya cyber-attack on Maersk in 2017. Detailed in The Daily Swig, this incident underscored the need for resilience and preparedness in mitigating the impact of cyber threats.

Furthermore, insights from Ship Technology shed light on the vulnerabilities exposed by the Maersk cyber-attack. A study by Futurenautics revealed that 44% of ship operators at the time did not believe that their companies’ cyber security defence capabilities were sufficient enough to repel cyber-attacks, and that 39% had experienced a cyber-attack in the last 12 months. These findings emphasised the urgent need for under-prepared industries to fortify their cyber security posture and adapt to the ever-changing threat landscape.

It was not just the maritime industry that demonstrated the need for industry-wide, incident response readiness. In the same year as the Maersk incident, the infamous WannaCry ransomware attack wreaked havoc on various organisations around the world, particularly the National Health Service (NHS). The WannaCry attack exploited vulnerabilities in outdated software systems, leading to widespread disruption of NHS services, including cancelled appointments, delayed surgeries, and compromised patient care. According to a “Lessons Learned” report by NHS England following the incident, The attack led to the disruption of services in one third of hospital trusts in England, with 80 out of 236 trusts effected.

A recent report conducted by Pheonix Software and the National Housing Federation (NHF) titled “The State of Cyber Security in Housing 2023’ found that just 4% of UK housing associations feel sector is fully prepared for ransomware attack.

It’s not just specific industries that are underprepared, as research found that 73% of surveyed organisations across the U.S., EMEA and APAC countries suffered a ransomware attack in 2022, with 38% being attacked more than once. (source: PR Newswire).


Conclusion

Facing a rapidly changing threat landscape; Ransomware attacks becoming more advanced and frequent, the emergence of AI in cyber attacks, geo-political tensions and increasing concerns about threats to national infrastructure, organisations across all sectors must take proactive steps to enhance their incident response capabilities. Initiatives like Red Teaming and Penetration Testing offer valuable opportunities for organisations to test and refine their incident response procedures through simulated scenarios, ensuring readiness to effectively mitigate cyber attacks.

Leveraging specialised incident response services, from providers like Sophos, can provide organisations with expert guidance and support in navigating cyber incidents. By investing in comprehensive incident response solutions, regularly revising incident response plans, and actively participating in training and exercises, organisations can bolster their resilience against cyber threats and minimise the potential impact of security incidents.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

The Cost of Cyber Security

The Cost of Cyber Security: The CFO's Handbook to Cyber Security Costs

The CFO's Handbook

Tom Davies, CFO at CyberLab, explains why investing in cyber security should be a key priority for CFOs and Finance Directors.

He covers:

  • Investing in cyber security to protect your business
  • Optimising cyber security budgets
  • Cyber security support


Failing to Invest in Cyber Security: A Key Risk to Your Business Survival

Cyber criminals are constantly scanning the internet for vulnerable targets and businesses are often lucrative targets for cyber criminals.

The UK Gov Cyber Breaches Survey for 2024 found that half of businesses (50%) have experienced some form of cyber security breach or attack in the last 12 months. This is much higher for medium sized businesses (70%) and large businesses (74%).

75% of domains identified breaches with Dark Web Monitor

Source: HackRisk, 2025

Failing to invest adequately in cyber security can lead to a breach that jeopardises the survival of your business.

The Cost of Downtime

The average downtime caused by ransomware attacks has risen dramatically, indicates the number of UK victims appearing on ransomware data leak sites doubling since 2022.

Organisations face on average 26 days of downtime following a ransomware attack. Could your organisation afford such a significant disruption?

Optimising Cyber Security Budgets: Balancing Flexibility and Long-Term Savings

Multiyear Licensing vs. Monthly Subscriptions

When planning your cyber security investment, choosing the right funding model is essential, especially when considering your organisation’s cash flow dynamics.

For enterprise-level organisations, multiyear licensing agreements often present a cost-saving opportunity. These agreements typically come with significant discounts, offering a more budget-friendly option over the long term. However, they require an upfront payment, which may strain cash flows depending on your financial situation.

Alternatively, organisations aiming to maintain greater flexibility and preserve cash flow can explore monthly subscription models. While these plans provide a more manageable month-to-month payment structure, they generally come at a higher total cost over the full duration of the agreement.

In-House vs. Outsourced Cyber Security

For enterprise-level organisations, building and maintaining an in-house cyber security team can be a cost-viable option. However, many organisations are struggling to attract and retain the specialised talent required to support such teams effectively. The ongoing global skills shortage in cyber security makes it increasingly difficult to recruit qualified professionals, often leading to overstretched teams and heightened vulnerabilities.

Retaining high-quality talent is critical. Without a well-staffed and adequately trained team, the risk of missing red flags grows significantly.

Outsourced Cyber Security: A Scalable Solution

Ultimately, the choice between in-house and outsourced cyber security comes down to organisational needs, size, and resources. Enterprise-level businesses with larger budgets and established IT infrastructures may benefit from in-house teams, provided they can recruit and retain the necessary talent.

For other organisations, outsourcing provides a cost-effective, scalable, and reliable way to ensure comprehensive cyber protection.

Outsourcing allows organisations to:

  • Access top-tier cyber security expertise without the challenges of recruitment and retention.
  • Ensure round-the-clock coverage that would otherwise require significant investment in staff and resources.
  • Scale protection to meet evolving threats, leveraging advanced tools and technologies provided by managed service providers.


CyberLab Control Services

Simple, secure, reliable managed security services designed to protect your organisation. Get help when you need it most and improve your cyber security posture.

We provide that extra layer to supplement your existing operation and complement vendor support, an easy way to outsource and address the complex, specialised issues. Select the level of service to suit your needs and budget. Our experts, contactable by both phone and email, can detect the problem, protect your organisation, and support your team.

Learn More

7.3% average compromise rate with Phishing Simulator

Source: HackRisk, 2025

The Financial Cost

As of 2024, the average cost for each data breach in the United Kingdom was £4.4 million, with the annual predicted cost of overall cyber crime in the UK for 2025 soaring to £524 billion.

Data breaches can result in hefty fines from regulatory bodies such as the Information Commissioner’s Office (ICO) and these fines can reach up to £17.5 million or 4% of your annual turnover, whichever is higher.

Beyond fines, organisations face escalating costs for investigation, remediation, and rebuilding their IT infrastructure. Add to this the growing expense of cyber insurance premiums, and it becomes clear how financially draining an incident can be.

The Reputational Cost

The costs of a cyber incident extend beyond immediate financial losses. Long-term brand damage is another critical consideration. According to the Cisco 2022 Consumer Privacy Survey, 76% of consumers stated they would not purchase from a company they do not trust with their data.

The erosion of trust not only results in lost customers but can also damage relationships with business partners and stakeholders. Rebuilding this trust and regaining market confidence can take years, costing your organisation not just money but growth opportunities.

Cyber Insurance Explained

Cyber risk is an evolving threat that requires proactive management, and this episode explores the complexities of cyber insurance, how it protects organisations, and the costs associated with cyber incidents.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation