Cybersecurity Blog

Hoya Corporation is one of the world's leading optical products manufacturers. It recently became victim of a massive cyber crime. The Ransomware gang demanded a whopping $10...
11 June 2024
AT&T experienced a massive data breach. Earlier estimates suggested that roughly 73 existing and former customers had their data compromised. The company later confirmed that the...
7 June 2024
Cyber Attack Tabletop Exercises are critical to business continuity and recovery after cybersecurity incidents. Their importance is regularly reiterated by regulators and insurers...
6 June 2024
Santander Bank staff & 30 million customers' data has allegedly been breached. Ticketmaster has suffered what could potentially be the biggest data breach in history, with...
5 June 2024
Transparent and smooth communications during a digital disruption are critical to business continuity, maintaining customer confidence and securing the reputation of the business....
4 June 2024
NIST’s Cybersecurity Framework (CSF) recently received its first major update since it was first released in 2014. NIST CSF 2.0 has a larger relevance across industries and...
1 June 2024
Your response in the Golden Hour of a Cyber Attack can significantly decide its impact on your business. And how you communicate determines how secure your brand reputation will...
30 May 2024
In recent years, blockchain technology has been booming and many organisations worldwide have started implementing it to secure their applications. Industries like financial...
28 May 2024
A third-party payroll system that the UK Ministry of Defence used was recently hacked. The effects of this attack have been severe to say the least. Not only has data of 270,000...
21 May 2024
Running a business in a digital environment without a plan for dealing with cyber attacks is plain myopic. Cyber Incident Response Plans and capabilities are what will come to...
17 May 2024
When investigating a security breach, one question always arises: “How was the network initially compromised?” Companies with extensive digital infrastructures have numerous...
8 May 2024
The National Institute of Standards and Technology (NIST) recently released an update to its landmark Cybersecurity Framework (CSF). The NIST CSF 2.0 now provides a robust...
7 May 2024
The ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, began on February 21, 2024, disrupting services across U.S. healthcare providers and pharmacies....
6 May 2024
Like any other engineer, a software developer must ensure their work meets the client's expectations. You must observe the basic principles of safety and security. You must...
26 April 2024
A ransomware attack in the healthcare space is always an ominous reminder of how cyber crime can directly impact human life. In case of the recent cyber attack on Lurie Children's...
25 April 2024
In an era where cyber threats loom large, businesses, regardless of their size, cannot overlook the importance of cybersecurity. In fact, small businesses often fall victim to...
25 April 2024
The National Institute of Standards and Technology (NIST) created the NIST Cybersecurity Framework (CSF) in 2014. Since then, this landmark document has served as an invaluable...
24 April 2024
The rising prevalence of cyber attacks has made it more important than ever for people and companies to safeguard critical data. Cybersecurity is also crucial to search engine...
22 April 2024
In the world of gaming, where excitement and competition flourish, there's a pressing issue that every gamer should be on high alert for—phishing scams. As the size and energy of...
20 April 2024
Did you know that in 2022 there were over 112 million malware attacks on smart home devices and other IoT devices? These gadgets that help manage everything from your lights to...
19 April 2024
Cyber Attacks in the Manufacturing Sector can be seriously disruptive. When production comes to a halt, the effects of any cybersecurity incident go beyond just damage to...
18 April 2024
The EU DORA or Digital Operational Resilience Act is a groundbreaking legislative framework designed to ensure operational stability of financial firms in the EU. The European...
15 April 2024
American Express warned some of its cardholders last month that their data may have been compromised in a third-party breach. The New-York based company reported that one of its...
10 April 2024
In July 2023, Chinese government hackers were spotted in Microsoft’s cloud environment. They seemed to have accessed email inboxes of at least 22 organisations including the US...
5 April 2024
The Digital Operational Resilience Act, often referred to as the EU DORA regulation, is a crucial regulatory framework which now supports regular Cyber Tabletop Exercises for...
2 April 2024
Anyone invested in cybersecurity and business continuity for their organisations can clearly see the importance of Cyber Attack Tabletop Exercises. Rehearsing the right Cyber...
27 March 2024
Nation State Cyber Threats pose an increasingly significant challenge to the global cybersecurity community. They don’t just jeopardise the digital security of precious assets,...
26 March 2024
23andMe, the genomics and biotechnology giant suffered a massive data breach in 2023. Genetic data of almost 7 million individuals was compromised. We've collated all the...
21 March 2024
The Digital Operational Resilience Act (DORA) is a European Union regulation focussed on improving digital operational resilience of financial entities in the EU. In this blog, we...
15 March 2024
Cybersecurity threats are evolving faster than ever and so should your Cyber Incident Response Plan. It's time to dust off your existing Cybersecurity Incident Response Plans,...
7 March 2024
Effective Cyber Incident Response Planning is critical to surviving the onslaught of cyber crime in 2024. Artificial Intelligence and Machine Learning in Incident Response applied...
6 March 2024
DORA is dominating headlines and if you’re in the financial services space in the EU, it’s probably also dominating all boardroom discussions. The Digital Operational Resilience...
22 February 2024
Major cybersecurity incidents across various sectors make news almost every week now. Hundreds of unique instances of malware, cyber attacks, ransomware attacks, data breaches and...
19 February 2024
American Mortgage Lending Giant was hit by a cyber attack towards the end of last year. The company had to shut down IT systems including access to their online payment portal,...
7 February 2024
As cloud computing becomes more popular, businesses are increasingly starting to rely on cloud services to store and handle their data. However, as with anything else operating...
4 February 2024
The current digital environment is experiencing a significant rise in the number and complexity of cyber attacks and ransomware attacks. A recent report highlights this change,...
1 February 2024
If you take a look at the recent cyber-attacks and ransomware attacks in the last three months, you’ll know that NOBODY is immune to them. You could be the biggest name in your...
30 January 2024
The U.S Securities and Exchange Commission (SEC) has sued SolarWinds and its Chief Information Security Officer, Timothy Brown, for allegedly deceiving investors and the public...
31 October 2023
The European Agency for Cybersecurity, ENISA, releases a report each year on the state of the cybersecurity environment entitled the ENISA Threat Landscape (ETL) report. This...
20 October 2023
Why was Merck’s battle and subsequent win against its insurer in the $1.4 billion cyber insurance battle such big news? Was it because cyber insurance claims never get rejected?...
21 September 2023
In an era increasingly dominated by digital infrastructure and online transactions, the significance of cybersecurity has never been more pronounced. Yet, as organisations build...
18 September 2023
Securing data is still top of mind, even though “data loss prevention” as a category is phasing out. Just look at the writing on the wall; as far back as 2018, Gartner...
16 September 2023
Zoom became synonymous with remote work at the onset of the 2020 healthcare crisis. Its ubiquity was so widespread that from being a video conferencing tool it actually became a...
12 August 2023
Least Privilege Access is a critical component of cybersecurity. The principle of least privilege access mandates that every user be given the least minimal access required to...
8 August 2023
If you want to protect your small to medium business from cyber threats, embracing hybrid cloud security is a great idea. In this article, we explore why and we also delve into...
7 August 2023
When it comes to creating an outstanding e-commerce website, choosing the right platform is crucial. Magento has long been recognized as a leading solution for online businesses,...
21 July 2023
If there’s one thing that businesses need to prepare for today, it’s cyber crime. With the rampant rise in cyber attacks and ransomware attacks, improving readiness to respond to...
19 July 2023
Barely a day goes by when a cyber attack or ransomware attack doesn’t make news. Cyber Security events have become some of the biggest and most expensive threats facing...
17 July 2023
Cyber Essentials is a UK government scheme designed to demonstrate that your organisation has a basic minimum level of cybersecurity. It certifies that you are protected against...
13 July 2023
Although the cybersecurity industry evolves in expertise, takes proactive measures, and employs advanced tools to detect and address cyber threats effectively, cybercriminals...
5 July 2023