Risk Management and
Cybersecurity Blog

Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?

Subscribe now

Okta cyber attack: cloud security Supply chain attacks

Okta cyber security attack: Supply chain attacks on the rise

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Paper with Indicator of Attack (IOAs) and Indicator of Compromise (IOCs)

Mitigating cyberattacks with IOAs and IOCs

IOA and IOC - what's the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
The Rise of Ransomware as a Service

The Rise of Ransomware as a Service

Ransomware as a service - what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Define sensitive data and how to protect it

How to define sensitive data and the means of protecting it 

What is sensitive data, how do you define it and how to protect it A report revealed that in ...
Breaking down new SEC rules on cybersecurity risk management

Breaking down new SEC rules on cybersecurity risk management

What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they ...
Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory ...
How to protect personally identifiable information

How to protect personally identifiable information from a cyber breach 

In recent years, personally identifiable information (PII) such as social security numbers, medical history, and banking details have become a ...
Cyber ecosystem - your Supply chain attack protection

How a cyber ecosystem works – your protection against a supply chain attack

A cyber ecosystem is very much like a physical ecosystem. Within a cyber ecosystem, individuals, organisations, and external parties interact with ...

Okta cyber attack: cloud security Supply chain attacks

Okta cyber security attack: Supply chain attacks on the rise

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Paper with Indicator of Attack (IOAs) and Indicator of Compromise (IOCs)

Mitigating cyberattacks with IOAs and IOCs

IOA and IOC - what's the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
The Rise of Ransomware as a Service

The Rise of Ransomware as a Service

Ransomware as a service - what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Define sensitive data and how to protect it

How to define sensitive data and the means of protecting it 

What is sensitive data, how do you define it and how to protect it A report revealed that in ...
Breaking down new SEC rules on cybersecurity risk management

Breaking down new SEC rules on cybersecurity risk management

What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they ...
Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory ...
How to protect personally identifiable information

How to protect personally identifiable information from a cyber breach 

In recent years, personally identifiable information (PII) such as social security numbers, medical history, and banking details have become a ...
Cyber ecosystem - your Supply chain attack protection

How a cyber ecosystem works – your protection against a supply chain attack

A cyber ecosystem is very much like a physical ecosystem. Within a cyber ecosystem, individuals, organisations, and external parties interact with ...