How to spot a Business Email Compromise and prevent future attacks

Business Email Compromise (BEC) is a type of cyber crime that involves misusing or impersonating a corporate email address to manipulate a company’s employees or contractors. The goal of BEC is normally to trick an employee into transferring funds or sharing sensitive information. BEC attacks are often sophisticated, and exploit email communication systems to [...]

By |2023-10-20T20:46:30+01:0026th September, 2023|Cybersecurity, DPO, Governments, News|

UK’s NCSC publishes new Shadow IT guidance

On 27 July 2023, the UK’s National Cyber Security Centre (NCSC) published a new guidance on what is collectively termed ‘Shadow IT’ to assist organisations in implementing appropriate risk management measures on ‘rogue devices and software’. The guidance helps organisations to pinpoint various types of activities that may be considered as ‘shadow IT’ within [...]

By |2023-10-20T20:54:39+01:0025th August, 2023|Cybersecurity, Digital Age, DPO, Governments|

Mass data leaks by large institutions highlight the severe threat of inadequate privacy measures

Reports about data breaches often focus on the financial impact on businesses. But recent data breaches involving three UK police services and the UK Electoral Commission have highlighted how inadequate data protection can threaten people’s safety—and even their lives. Responding to a freedom of information request on 8 August, the Police Service of Northern [...]

By |2023-10-20T20:56:21+01:0017th August, 2023|Cybersecurity, Data Breaches, DPO, Governments|

ChatGPT and Cybersecurity – A Closer Look

Let’s take a closer look at the latest chatbot ChatGPT and what this could potentially mean for the cybersecurity industry.  ChatGPT – the bustling chatbot ChatGPT, the trending conversational agent or chatbot was built by OpenAI. It makes use of a large-scale pre-trained neural network language model known as the GPT (Generative Pre-trained Transformer) [...]

By |2023-04-24T15:20:12+01:0024th April, 2023|ChatGPT, Cybersecurity, DPO, Governments, International|

Encryption – The Benefits for Businesses

What is Encryption? Encryption is an added security measure. It involves converting human-readable data to ciphertext. This is so that it cannot be read by those who are not the intended recipients of the data. Only those with the key to decrypt the data can convert it back to plaintext. Decryption is the process [...]

By |2023-03-15T12:34:12+00:0015th March, 2023|Cybersecurity, DPO, Encryption, International|

Tabletop exercises prepare your team for real cybersecurity disasters

Imagine you’re hiring a bodyguard. There are two candidates for the position, and Candidate A has read every security book that there is. Candidate B may not have such an encyclopaedic understanding of the industry, but what he does bring is ten years of proven experience of real security scenarios. Unless Candidate A can [...]

By |2022-05-27T11:45:37+01:0012th May, 2022|Cybersecurity|

The New Threat of Cyber Warfare webinar recording

The increased risk of cyber warfare is one of the biggest issues facing businesses across sectors, and around the world. What should you be looking out for and how to protect your business? Watch the recording of our expert panel discussion on the threat of cyber warfare. Sign up to [...]

By |2022-05-04T13:24:03+01:004th May, 2022|Cybersecurity|

Key considerations for tackling ransomware

Recent headlines have highlighted the growing cybersecurity risks to UK firms, in line with the ‘steady and significant’ rise in ICO-reported attacks. Additionally, there has been some speculation that risks will continue to grow in retaliation to sanctions against Russia. However, not all attacks are equal. Since the ICO began publishing their data in [...]

By |2022-03-31T15:17:18+01:0030th March, 2022|Cybersecurity, DPO|

The Ukraine crisis and the heightened risk of cyberattacks

In these dark days of war in Eastern Europe, it is sad to say that the risk of cyberattacks is heightened. It is important to remain vigilant and to ensure all necessary proactive steps are taken to protect data, including:Revisit your risk profile and, if you are a processor holding personal data for other organisations, [...]

By |2022-05-06T10:20:31+01:0025th February, 2022|Cybersecurity, International, News, ThoughtLeadership|
Go to Top