Why Cyber Security Training is Important for Organisations

mitigatecyber

Contrary to the belief of some, cyber attacks are targeted not just at large enterprises and government institutions. The reality is that cyber security threats exist everywhere; at both an organisational and individual level. To help instil a cyber security mindset among employees and minimise the risk of breaches, organisations must implement cyber security training.   What […]

Why Cyber Security Training is Important for Organisations Read More »

A New Collaboration of Cyber Security Professionals and Experts are Launching the Lancashire Cyber Alliance

Organisations in the Lancashire region have an opportunity to join the Lancashire Cyber Alliance (LCA), which will give membership of the North West Cyber Security Cluster. This new group will offer expert cyber security advice and skills for SMEs, large businesses and other organisations, specifically in cyber security. The LCA are hosting their launch event

A New Collaboration of Cyber Security Professionals and Experts are Launching the Lancashire Cyber Alliance Read More »

Cyber Essentials 2022 Update

On the 24th January 2022, IASME and the National Cyber Security Centre will introduce an updated set of requirements for the Cyber Essentials certification scheme. The update is the biggest overhaul of the scheme’s technical controls since it was launched in 2014. Over the past two years, the adoption of cloud services has massively increased

Cyber Essentials 2022 Update Read More »

GoDaddy Data Breach Exposes 1.2 Million User Accounts

mitigatecyber

Several GoDaddy customers using its Managed WordPress hosting service were exposed due to a data breach that exposed SSL keys – likely affecting a large number of customers. It has prompted concerns about attackers hijacking domains for the purpose of deploying ransomware or spoofing them in order to steal credentials and other harmful activities. GoDaddy,

GoDaddy Data Breach Exposes 1.2 Million User Accounts Read More »

Cyber Threats: What Are They?

mitigatecyber

According to a cyber security expert, the Oxford Dictionary definition of cyber threat is somewhat outdated: “A malicious attempt to harm or interfere with computer networks and computer systems.” This statement is incomplete without including the potential for damaging or stealing data and disrupting digital operations.   The threat is described as a possibility according

Cyber Threats: What Are They? Read More »

Common Cyber Security Myths That Increase Your Vulnerability to Cyber Attacks

mitigatecyber

An attack by a cyber criminal is one of the worst things that could happen in a working environment, and no one would want to be a victim of it. You may feel on edge because of the possibility of your personal information being taken from you, as well as very sensitive company data. Oftentimes,

Common Cyber Security Myths That Increase Your Vulnerability to Cyber Attacks Read More »

Cyber Security First Aid: The Steps for Business Recovery Following a Cyber Attack

mitigatecyber

As technologies advance and become more integrated into our lives, so do the tactics used by cyber criminals to try and compromise your business. Keeping up to date with the latest cyber criminal activities can be difficult, and ensuring your business has an effective cyber security strategy throughout its operations can also seem like an

Cyber Security First Aid: The Steps for Business Recovery Following a Cyber Attack Read More »

UK Transport Sector Targeted By Nine UnReported Cyber Attacks

mitigatecyber

Nine cyber attacks in the last three years affecting the UK transport sector have been missed by the UK’s mandatory reporting laws. These attacks were only disclosed to the Government for Transport on a voluntary basis. This is because the mandatory thresholds for reporting cyber incidents across the energy, transport, health, water and digital infrastructure

UK Transport Sector Targeted By Nine UnReported Cyber Attacks Read More »

REvil Malware Infection: What is the Kaseya Attack?

Hacker in the hood working with laptop typing text in dark room. Image with glitch effect

The IT management software vendor, Kaseya, recently suffered a large-scale REvil ransomware attack – REvil is the same group supposedly responsible for attacking meat processing giant JBS at the end of May. The attackers were reported to have compromised Kaseya’s remote monitoring system, VSA, resulting in its customers temporarily shutting down their on-premises servers. According

REvil Malware Infection: What is the Kaseya Attack? Read More »

Feature Release – Compliance Courses

Compliance Course

Compliance Courses. Mitilearn is our cyber security awareness training service that provides modules focused on best practises within cyber security and GDPR, as well as giving information around cyber-criminal activities and the ways they could compromise your data and finances. Mitilearn is designed by experts and built in-house, giving our users a comprehensive, yet simplified,

Feature Release – Compliance Courses Read More »

Scroll to Top