News

We are now CHECK certified

We are proud to announce that our penetration testing services are officially CHECK accredited. This prestigious certification, awarded by the National Cyber Security Centre (NCSC), recognises us as a Certified CHECK Provider. It means we’re trusted by the UK Government to deliver rigorous, high-quality penetration testing.  Achieving CHECK accreditation is significant and a testament to […]

We are now CHECK certified Read More »

Website Domain Migration Rebrand

Citation Cyber Banner

In 2020, we rebranded from Xyone to Mitigate Cyber, and in June 2022, we were acquired by The Citation Group – a leading provider of compliance and quality solutions.   From joining The Citation Group, we felt it was necessary to align ourselves with our sister companies – to become a unified entity offering business services

Website Domain Migration Rebrand Read More »

CrowdStrike Major IT Outage

Exploring the cause, consequences, and recovery efforts of the recent CrowdStrike cyber incident On Friday 19 July 2024, global cyber security firm, CrowdStrike, released a content update for Windows hosts, resulting in a major IT outage that affected businesses and services worldwide. Significant disruptions to those included banks, airlines, railways, telecommunications companies, TV and radio

CrowdStrike Major IT Outage Read More »

UK Transport Sector Targeted By Nine UnReported Cyber Attacks

mitigatecyber

Nine cyber attacks in the last three years affecting the UK transport sector have been missed by the UK’s mandatory reporting laws. These attacks were only disclosed to the Government for Transport on a voluntary basis. This is because the mandatory thresholds for reporting cyber incidents across the energy, transport, health, water and digital infrastructure

UK Transport Sector Targeted By Nine UnReported Cyber Attacks Read More »

REvil Malware Infection: What is the Kaseya Attack?

Hacker in the hood working with laptop typing text in dark room. Image with glitch effect

The IT management software vendor, Kaseya, recently suffered a large-scale REvil ransomware attack – REvil is the same group supposedly responsible for attacking meat processing giant JBS at the end of May. The attackers were reported to have compromised Kaseya’s remote monitoring system, VSA, resulting in its customers temporarily shutting down their on-premises servers. According

REvil Malware Infection: What is the Kaseya Attack? Read More »

4 Top Tips to Defend Against Ransomware Attacks

Professional hacker with laptop sitting at table, closeup

Given the frequency of large-scale ransomware attacks in recent months, it’s no surprise that ransomware is the cyber threat that’s on everyone’s minds right now. Today, ransomware presents a multi-billion pound attack vector for cyber criminals. Statistics revealed there were 304 million ransomware attacks in 2020 – 62% up on the total number of ransomware

4 Top Tips to Defend Against Ransomware Attacks Read More »

Meat Processing Company Hacked with a Ransomware Attack

mitigatecyber

JBS, the world’s largest meat processing company, which supplies beef production in the US, Australia and Canada, is the latest major company to be hit by a ransomware attack by cyber criminals. The attack forced operations to grind to a halt, impacting thousands of workers and disrupting the meat supply chain. Ransomware, which locks down

Meat Processing Company Hacked with a Ransomware Attack Read More »

Cyber Threats Plaguing the Education Sector

Plaguing

With cyber security becoming a more prominent need in the Education sector, it’s time to face the threats. Because let’s face it, cyber criminals know the Education sector isn’t as well funded for security. In every Education institute, cyber security needs to become relevant in all areas, not just IT. Administrators, educators and assistants need

Cyber Threats Plaguing the Education Sector Read More »

Phishing – A Simplified Guide

Phishing isn’t a new tactic used by cyber criminals, in fact, phishing has been common since the 90’s. But, as technologies advance, so do the ways in which cyber criminals try and deceive you into providing personal information and financial details. Not only could a phishing attempt try and steal your personal data and financials,

Phishing – A Simplified Guide Read More »