Cyber Security Blog

Cyber Security Blog

See how the right people, technology and services can deliver game-changing results

Cyberlab become a Trusted Partner for the EMCRC

CyberLab become a Trusted Partner for the EMCRC CyberLab are absolutely delighted to become a Trusted Partner with the East …

Read More
Blog - Synchronised Security 

Five Significant Savings with Synchronised Security

Five Significant Savings with Synchronised Security With Sophos‘ decision to retire on-premise legacy security platforms and focus on next-generation products, …

Read More
Illustration MFA

A Hackers Guide to Remote Working

A Hacker’s Guide to Remote Working Hybrid working is brilliant news for a hacker, not in the sense that they …

Read More
Blog - Compliant. Certified. Are you secure?

Compliant. Certified. Are you secure?

Compliant. Certified. Are you secure? Since GDPR came into force the stakes have never been higher, businesses must comply with …

Read More

Travelex – How not to handle a Cyber Incident

Travelex – How not to handle a Cyber Incident What happened? On New Year’s eve as parties were in full …

Read More

What is a social engineering attack?

What is Social Engineering? Who presents the most dangerous threat inside your business? Most organisations would be surprised to know …

Read More
Penetration testing

Types of Penetration Test – What is the Difference?

What Is Penetration Testing: An Overview of Its Various Types https://youtu.be/UtntOZtEZ48 Vulnerability Assessment Vulnerability Assessments are most often used by …

Read More

Windows 7 – End of life, are you prepared?

Windows 7 End of Life – Are you prepared? What is happening? Microsoft are retiring a number of operating systems …

Read More
Pen pointing at screen stock photo

Penetration Test Versus Vulnerability Assessment

Penetration Test Versus Vulnerability Assessment The Difference Between Technical Security Weaknesses Discovery Techniques For years customers have been confused what …

Read More

Why your business should monitor the Dark Web

Why & How Your Business Should Monitor the Dark Web What is the Dark Web? The internet has three main …

Read More

Could your business survive a cyber attack?

Could your business survive a cyber attack? In a recent EMEA Solarwinds survey, businesses were asked ‘how long could you …

Read More