Cyber Security Blog

Cyber Security Blog

See how the right people, technology and services can deliver game-changing results

MI5 warns of spies using LinkedIn to trick staff into spilling secrets

MI5 warns of spies using LinkedIn to trick staff into spilling secrets It has been found that at least 10,000 …

Read More

Pets’ names ‘used as passwords by millions’

Pet names ‘used as passwords by millions’ A recent survey conducted by the National Cyber Security Centre (NCSC) has found …

Read More

Cyberlab named as an approved supplier on HM Government G-Cloud 12 Framework

Cyberlab named as an approved supplier on HM Government G-Cloud 12 Framework CyberLab has been certified under the Crown Commercial …

Read More

Cyberlab become a Trusted Partner for the EMCRC

CyberLab become a Trusted Partner for the EMCRC CyberLab are absolutely delighted to become a Trusted Partner with the East …

Read More
Blog - Synchronised Security 

Five Significant Savings with Synchronised Security

Five Significant Savings with Synchronised Security With Sophos‘ decision to retire on-premise legacy security platforms and focus on next-generation products, …

Read More
Illustration MFA

A Hackers Guide to Remote Working

A Hacker’s Guide to Remote Working Hybrid working is brilliant news for a hacker, not in the sense that they …

Read More
Blog - Compliant. Certified. Are you secure?

Compliant. Certified. Are you secure?

Compliant. Certified. Are you secure? Since GDPR came into force the stakes have never been higher, businesses must comply with …

Read More

Travelex – How not to handle a Cyber Incident

Travelex – How not to handle a Cyber Incident What happened? On New Year’s eve as parties were in full …

Read More

What is a social engineering attack?

What is Social Engineering? Who presents the most dangerous threat inside your business? Most organisations would be surprised to know …

Read More
what is a pen test

What is Penetration Testing?

What Is Penetration Testing? Penetration Testing, or a Pen Test, is a security test that launches a mock cyber attack …

Read More

Windows 7 – End of life, are you prepared?

Windows 7 End of Life – Are you prepared? What is happening? Microsoft are retiring a number of operating systems …

Read More
Pen pointing at screen stock photo

Penetration Test Versus Vulnerability Assessment

Penetration Test Versus Vulnerability Assessment The Difference Between Technical Security Weaknesses Discovery Techniques For years customers have been confused what …

Read More