Insights

Managing Ransomware Negotiations

Written by Omar Sheppard “Hello, my friend! Your system was vulnerable and I’m here to teach you a lesson, a security lesson!”  To discover a message like the one above is

Read More +

Incidentally Informed – The Most Common Mistakes When Responding To A Cyber Attack

This month we discussed the most common mistakes that are made when responding to a cyber attack. We explored this topic with our fantastic panel of speakers who offered their insights

Read More +

How Safe is Your Data When You Outsource?

Written by Frank Siepmann Outsourcing has been a common business strategy since the early 2000s, however, in an article published by Janice Wong of St Andrews University, she stated that

Read More +

Why Should You Use a VPN For All Of Your Devices?

Written by Hannah Golding What Is A VPN? A VPN, or ‘Virtual Private Network’, is a service that not only encrypts your data, but also hides your IP address online

Read More +

Incidentally Informed – Cybersecurity Visibility: You Can Only Act On What You See

During this webinar, we discussed the strategies you can employ to better identify holes within your cybersecurity posture and the strategies that you can implement within your own business to

Read More +

The Continuation of Remote Working: How Utilizing Public Wi-Fi is a Danger to Cyber Security

Written by Michael Martin With the continuation of remote working and the loosening of COVID restrictions, many people are venturing out to work in public. All of this is made

Read More +

Radius to Secure Your Corporate Network Using EEE 802.1x

Written by Morris Johnson By executing 802.1x on your network, you can greatly reduce the risk of your data and equipment being affected by a cyberattack. The IEEE 802.1x protocol

Read More +

Why a LAPS Solution Can Help to Further Secure Your Network and How to Install It

Written by Charlie Stubbs What is Microsoft LAPS? Local Administrator Password Solution (LAPS) acts as a password manager for Active Directory (AD). It ensures that all local administrators have unique

Read More +

The Importance of Change Management and Why it is Critical to Business Systems Security and Maintenance

Written by Tony McEvoy Any IT environment needs to be secure from internal and external threats even before, during and after a breach. As well as the physical components of

Read More +

Be Proactive, Not Reactive – Why Employee Training and Incident Response Planning Should be at the Heart of Your Business

Written by Jay Jay Davey Over the course of the last year, CyberClan and the rest of the security industry have observed a large increase in ransomware attacks. These attacks

Read More +

Incidentally Informed – How to Achieve Cyber Resilience in Today’s Threat Landscape

The number of vendors providing some sort of technology to protect against or detect threats is growing daily. However, breaches still occur at an even more frequent rate than ever.

Read More +

What is Pass-The-Cookie Website Exploitation?

Written By Hannah Golding What is a Website Vulnerability? An attacker will first discover a vulnerability, then attempt to exploit it to gain a foothold within the host. Most commonly,

Read More +
icon-dark icon-light icon logo-light