
IT Blog Category: Cybersecurity

Cybersecurity – The importance of Testing & Training
Many organisations offer cybersecurity training to their staff, but training and testing as a combined strategy provides a much stronger defence against cybercrime. [...]

Man-in-the-Middle (MITM) attack – Cyber secure series
Man-in-the-middle attacks mean an attacker has intercepted communications between two people and has altered them in some way. Learn more today. [...]

Data rrotection and innovation: The role of the ICO Regulatory Sandbox in the UK
In this blog, we'll explore the concept of the ICO Regulatory Sandbox and its objectives in the data protection landscape in the UK [...]

What is a break glass account?
If you’re creating a business continuity plan, have you considered a break glass account? Learn what one is and how to create one here. [...]

Cybersecurity vs cyber resilience – what is the difference?
What’s the difference between cybersecurity and cyber resilience, and how can you implement them? We cover this and more. [...]

Celebrating 20 Years of Cybersecurity Awareness Month
October is Cybersecurity awareness month, follow us on LinkedIn or Twitter for daily tips on how you can protect your organisation against Cybercrime. [...]

How much should businesses invest in cyber resilience?
In this blog we explore how much organisations should invest in cyber resilience to protect against cybercrime [...]

The European Cyber Resilience Act explained – how it impacts your business
On the 15th of September 2022, the European Commission published its proposal for new regulation regarding cybersecurity requirements for products with digital elements (such as smart fridges, cameras, TVs [...]

What is cyber resilience? A complete guide
Firewalls and anti-virus software are just the first steps in protecting your organisation from cyber threats (this is cybersecurity). However, you need more than that and this is where [...]