In part 1 of our 4-part series, we discussed how to evaluate your organisation’s security risks and the steps to creating a risk management strategy, including building a security policy. In part 2 we are looking at how to take that policy and implement technical security protection to help mitigate those risks.
Posted on 2nd September 2019
Posted on 6th August 2019
Modern cyber-attacks can target a wide range of aspects of an organisation, so it’s critical to ensure you evaluate each aspect of your security program. We’ve heard a lot about insider threats, such as Sage getting exploited by an employee back in 2016, and about supply chain threats such as NotPetya which was deployed through a malicious software update in 2017.
Posted on 6th June 2019
Just 27% of businesses in the UK reported that staff had attended internal or external training on cybersecurity in the last 12 months* and more often than not, what is being taught is either incomplete or no longer relevant.
Posted on 31st May 2019
On September 7th 2017 Equifax, one of the largest credit agencies in the world, they announced that they had become the victim of a major breach resulting in over 150 million records being stolen. On 8th September their share price plummeted 13.7% and after two weeks it had fallen from 142.72 to 92.98 (34.58%).
Posted on 9th April 2019
We are pleased to announce that Shearwater Group PLC, has entered into a share purchase agreement to acquire certain business and assets of Pentest Limited, a subsidiary of Secarma Limited. These assets consist of a small number of employees and legacy clients, including the Databridge Software Division, which owns and operates a cloud-based platform-as-a-service software package.
Posted on 31st October 2018
A successful cybersecurity assessment starts well before any report is delivered, even before testers are allowed anywhere near a company’s network, application or device.
Posted on 24th October 2018
When you think about hacking you probably think about technology. Hackers digitally breaking into an organisation or government systems, stealing data or bringing down whole networks. But hackers don’t just use technology to breach a potential target, sometimes the old ways are the most effective and physically gaining access to a company's premises can provide threat actors with ultimate control of digital estates.
Posted on 3rd October 2018
Supply chains are increasing, both in terms of size and complexity, and more and more third-parties now have access to company data than ever before.
Posted on 3rd September 2018
There’s no denying that our world has become more connected and we now have unrivalled choice when it comes to the products and services we use as individuals.