Blog - Hybrid working

What is a Phishing Attack: Examples & Action Plans

What is a Phishing Attack: Examples & Action Plans In this article CyberLab CEO Gavin Wood covers:  Email, businesses depend on it, and regardless of whether you love it or hate it, it’s here to stay. Even with the seemingly … Read More

Blog - 5 tools to get things done

Dive into SME Cyber Security

Dive into SME Cyber Security A Deep Dive into Microsoft 365 E5 Dan Cooper, Security Consultant at CyberLab, reviews the integrated security Microsoft offers as part of their E5 licence and tells the story of one of our customers who … Read More

Defence in Depth – Is this still a valid approach to Information Security

Defence in Depth: Layered Security Strategy Securing Organisations Against the 2025 Threat Landscape Cyber security threats in 2025 have become more advanced, with attackers leveraging AI, supply chain vulnerabilities, and geo-political tensions to launch increasingly sophisticated and targeted campaigns. As … Read More

Illustration balancing usability and functionality

Active Monitoring Keeps You Secure

Active Monitoring Keeps You Secure Gavin Wood, CEO at CyberLab, takes a trip down memory lane, summarising his years of experience in the industry and the new level of protection all organisations need. He covers: “There are only two types … Read More

Blog - Cloud security tips

Your Security Questions Answered

Your Security Questions Answered Top three questions every business and IT leader ask themselves Security is very much in the news, with a catastrophic attack on the Irish Health Service with an estimated £100m cost of remediation and significant disruption … Read More

Cyber Essentials April 2021 Update

Cyber Essentials April 2021 Update IASME have recently introduced a number of changes to the Cyber Essentials question set with a view to providing clarification on certain questions to help applicants better understand the requirements for Cyber Essentials. The new … Read More

Facebook Data Breach Investigation

Facebook Data Breach Investigation Facebook is currently being investigated by a number of countries after a database, which is believed to contain a mix of names, phone numbers, locations, and other details of over 530 million people has been published … Read More

Home Working: Cyber Security Perspective

Home Working: Cyber Security Perspecitve Over the last year many companies have migrated to having their staff working from home and accessing key company information remotely. While this has definitely helped companies to continue day-to-day operations during the pandemic, this … Read More

MI5 warns of spies using LinkedIn to trick staff into spilling secrets

MI5 warns of spies using LinkedIn to trick staff into spilling secrets It has been found that at least 10,000 UK nationals have been approached by fake profiles linked to hostile states on the professional social network, LinkedIn. Malicious profiles … Read More

Pets’ names ‘used as passwords by millions’

Pet names ‘used as passwords by millions’ A recent survey conducted by the National Cyber Security Centre (NCSC) has found that 15% of the population uses pets’ names, 14% use a family member’s name and 13% pick a notable date … Read More