Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

British Airways, Boots & The BBC Cyber Attack 2023

Last week the British Airways, Boots and the BBC all suffered cyber attacks of varying levels. The three businesses have been hit with an ultimatum to begin ransom negotiations from a cybercrime group after employees personal data was stolen in a hacking attack. It emerged on Wednesday the gang behind a piece of ransomware known as Clop had posted it onto their dark net site.

Cloud Security Assessment

Cloud security is the practice of protecting data, applications, and infrastructure that reside on cloud computing platforms. This includes Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and other public and private cloud services. It involves implementing security protocols such as encryption, authentication methods, firewalls and access control to help protect the data and applications that are hosted on cloud servers.

The Importance and Benefits of Incident Response

An Incident Response Plan prepares a business for responding to a security breach or cyber-attack. An Incident Response Plan outlines the steps an organisation should take when they discover a potential cyber-attack, allowing them to quickly identify, contain, and remediate threats. It’s also essential for organisations to have processes in place when reporting a cyber attack.

Cyber Security Surrounding Social Media

Social media platforms have become primary forms of communication in today’s digital world. This technology has allowed us to virtually connect with friends, family and colleagues from all over the globe. Still, it has opened up new avenues for cybercriminals to exploit users’ data. The risk of digital identity theft, financial fraud and other malicious activities increases with the use of social media.

Vulnerability Highlight: WordPress Error-Based Information & Exposure

By default, the WordPress administrative login page displays a helpful error message whenever an account user types in the wrong username/email address or password. Unfortunately, these same helpful error messages can also be abused to assist a threat actor to validate account usernames/email addresses and/or passwords. An incorrect username/password guess combination generates the following error message: “The username ‘name-entered’ is not registered on this site”.

Incident Response Service Breakdown

Incident response is a comprehensive approach to dealing with potential security incidents, such as unauthorised access, data breaches, and malicious attacks that might affect an organisation’s network. The goal of incident response is not just to contain the threat but also to learn from it by understanding what happened, why it happened, and how it can be prevented from happening in the future.

Why is Cybersecurity Training not Working?

Cybersecurity threats are constantly evolving, and organisations need to stay ahead of these threats. This is to protect their data and systems. Data breaches cost the UK an average of £2.9 million per breach, 82% of breaches involving the human element. Moreover, those factors alone are usually enough to convince people that cybersecurity awareness needs improving and training to mitigate this. One way they can do this is by providing employees with cybersecurity awareness and training.