Cybersecurity Blog

Casino and Hotel companies MGM Resorts International and Caesars Entertainment have been dominating news headlines in the past few days. Unfortunately, the reasons aren't worth...
18 September 2023
In an era increasingly dominated by digital infrastructure and online transactions, the significance of cybersecurity has never been more pronounced. Yet, as organisations build...
18 September 2023
Securing data is still top of mind, even though “data loss prevention” as a category is phasing out. Just look at the writing on the wall; as far back as 2018, Gartner...
16 September 2023
Despite the risks associated with crypto trading, many people continue to maintain a high level of interest in cryptocurrencies. High returns can be considered as one of the...
15 September 2023
When a product, that has the word 'Security' in its name, becomes the target of a zero-day attack which ends up compromising several other businesses, it is certainly an event to...
12 September 2023
Data storage giant, Western Digital, was attacked earlier this year and confirmed that hackers stole 10 terabytes of data, including sensitive customer information. Apart from the...
7 September 2023
Our monthly roundup of the Biggest Cyber Attacks, Ransomware Attacks and Data Breaches is here for the month of August 2023. Healthcare, educational institutions, VPN products,...
1 September 2023
Cybercriminals and hackers are always on the lookout to exploit businesses' infrastructure and security vulnerabilities contributing to the energy industry's many challenges. A...
28 August 2023
The need for third-party data sharing has intensified past the point of no return. Collaborations, alliances, and partnerships are the new currency in the business ecosystem of...
24 August 2023
Technology plays a huge role in business today, and this is especially true for new ventures. Without a presence on the web, it's very likely that some of their target customers...
16 August 2023
As a small business owner, you cannot overemphasise the importance of good internet connectivity. It’s quite well-known that the use of the Internet for various functions,...
14 August 2023
Zoom became synonymous with remote work at the onset of the 2020 healthcare crisis. Its ubiquity was so widespread that from being a video conferencing tool it actually became a...
12 August 2023
The frequency of security incidents caused by insiders is increasing. The recent 2022 Cost of Insider Threats Global Report by the Ponemon Institute reveals that 67% of companies...
10 August 2023
Least Privilege Access is a critical component of cybersecurity. The principle of least privilege access mandates that every user be given the least minimal access required to...
8 August 2023
If you want to protect your small to medium business from cyber threats, embracing hybrid cloud security is a great idea. In this article, we explore why and we also delve into...
7 August 2023
What do a zoo, a general hospital, a Plastic Surgery clinic and an earthquake monitoring centre have in common? Nothing much except the fact that they are all treasure troves of...
1 August 2023
In an era where cyber threats are ever-present, organisations are seeking robust solutions to safeguard their sensitive data. The use of Virtual Data Rooms or VDRs has...
29 July 2023
On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) released its new set of rules on Cyber Incident Management and Reporting. In a news release titled “SEC Adopts...
28 July 2023
Doing business internationally is no longer an option in the interlinked economy of today. Globalization has opened new markets, allowing companies to reach a wider customer base...
25 July 2023
When it comes to creating an outstanding e-commerce website, choosing the right platform is crucial. Magento has long been recognized as a leading solution for online businesses,...
21 July 2023
Today, as information is primarily stored in digital platforms and is able to travel easily throughout the world, protecting it has become more important than ever. This is what...
20 July 2023
If there’s one thing that businesses need to prepare for today, it’s cyber crime. With the rampant rise in cyber attacks and ransomware attacks, improving readiness to respond to...
19 July 2023
In the digital age, the battlefield has shifted. Our adversaries are no longer just on the other side of physical borders, but can strike from anywhere, at any time, through the...
18 July 2023
Cybersecurity has evolved along with technology and information systems to become a crucial aspect of the contemporary world. Nevertheless, the development of artificial...
17 July 2023
Barely a day goes by when a cyber attack or ransomware attack doesn’t make news. Cyber Security events have become some of the biggest and most expensive threats facing...
17 July 2023
Cyber Essentials is a UK government scheme designed to demonstrate that your organisation has a basic minimum level of cybersecurity. It certifies that you are protected against...
13 July 2023
Cyber Security governance refers to the overall approach that you use to direct and manage your organisation’s cyber security. This includes a methodical approach to processes and...
7 July 2023
Although the cybersecurity industry evolves in expertise, takes proactive measures, and employs advanced tools to detect and address cyber threats effectively, cybercriminals...
5 July 2023
AIIMS New Delhi, is one of the most premier, government-run healthcare organisations in the largest democracy in the world, India. The ransomware attack on AIIMS Delhi did not...
5 July 2023
June 2023 saw some of the biggest cybersecurity breaches, attacks and eye-catching news stories this year. Here's a complete roundup of all the recent cyber attacks, data breaches...
3 July 2023
Ransomware infections, data breaches, serious outages due to cyber- attacks - sadly these have become common news items on an almost daily basis. They also cause massive financial...
29 June 2023
Maintaining Business Continuity in the face of a cyber-attack can seem like a very elusive goal to many. But it doesn’t have to be that way. Despite the many threats that loom...
27 June 2023
Cyber Management Alliance's Wisdom of Crowds events are renowned across the globe for bringing together the finest minds in the cybersecurity space to collaborate and create...
26 June 2023
Runecast, was one of the keynote presenters at our recent Wisdom of Crowds event in London. The focus of the keynote address was how getting your foundation right and focussing on...
23 June 2023
Cyber Management Alliance recently hosted one of its most successful Wisdom of Crowds events till date in London. Held at the Sofitel St. James’s London, the event saw one of the ...
20 June 2023
Compliance in cyber security is about ensuring that your organisation adheres to various industry standards, international regulations and laws related to protecting data privacy.
19 June 2023
Cybersecurity technologies are evolving, and with it, the value of the industry. It is worth considering cybersecurity and related industries as lucrative investment avenues in...
16 June 2023
One of the biggest threats to modern businesses is cybercrime. With every possible business transaction going online, cyber criminals are becoming more advanced each day and are...
14 June 2023
Cyber attacks, security incidents and data breaches are constantly in the news. But when a cybersecurity vendor itself gets compromised, it does make everyone stand up and notice.
9 June 2023
Cyber Management Alliance recently hosted what we believe was the largest in-person Cyber Attack Tabletop Exercise in London. The exercise was part of our flagship Wisdom of...
8 June 2023
The digital space is the perfect breeding ground for many sophisticated cyber threats, creating an ongoing battle between organisations' IT staff and hackers. According to ...
7 June 2023
Yet another supply chain-attack with yet another list of high-profile victims that’s only growing every day. We are talking about the attack on Progress Software’s MOVEit Transfer...
7 June 2023
Business Continuity Management, in the simplest terms, refers to proper planning that ensures smooth running or speedy recovery of operations after major natural/man-made...
5 June 2023
In a world increasingly reliant on digital technology, businesses must prioritize both effective document management and robust cybersecurity measures. This is essential not only...
2 June 2023
We're almost into the second half of the year but the cyber attacks, data breaches and ransomware attacks are nowhere close to abating. May 2023 saw a fair share of high-profile...
1 June 2023
Students are exposed to many tech benefits and risks in today's digital landscape. Digital technologies have become integral to the lives of youth worldwide, including platforms...
31 May 2023
Today small businesses have to contend with various economic challenges, triggered by the global pandemic, soaring inflation, and the European conflict. However, they also have to...
29 May 2023
A Cyber Incident Response Plan is a crucial document that outlines the steps and actions that a business must take in response to cybersecurity incidents. In today's complex...
25 May 2023
The first half of 2023 isn’t even close to over yet. But we’ve already seen enough cyber attacks that could fill pages till the end of the year. It’s true that cybersecurity...
23 May 2023
As the world becomes increasingly digitized, remote access software has become an essential tool for businesses of all sizes. With remote access software, employees can access...
20 May 2023