Phishing

Incident response: What to do in the event of a cyber attack

Hacker in the hood working with laptop typing text in dark room. Image with glitch effect

Over the past 12 months, there were 7.78 million incidents of cyber crime against UK businesses (Gov.uk). Cyber crime is evolving and increasing at a rapid pace, and the UK government are planning to introduce additional measures including the Cyber Security and Resilience Bill as an effort to boost the nation’s defences against cyber crime. […]

Incident response: What to do in the event of a cyber attack Read More »

Understanding the red team vs blue team approach to cyber security

mitigatecyber

If you’ve ever enquired about testing services on your organisation’s infrastructure, you might have been presented with terms including red team, blue team, and purple team. Whilst each testing approach has a different methodology, they ultimately aim to bolster your organisation’s security defences and support your efforts with defending against cyber attacks and data breaches.

Understanding the red team vs blue team approach to cyber security Read More »

Security Vulnerability Assessment – Key Concepts for a Solid Security Plan

mitigatecyber

Many organisations are currently in the process of updating their security measures to better protect against cyber threats. One way to do this is through a vulnerability assessment, which is an important step in the organisation’s risk management strategy. If you don’t know about the probability of being infected by one of these vulnerabilities, analysis

Security Vulnerability Assessment – Key Concepts for a Solid Security Plan Read More »

The avalanche of cyber security: How to identify the real threats

In this day and age, the wave of cyber security threats is deafening. Every week, businesses are facing millions of new malware variants and hacks, as well as having to deal with the deluge of media hype and marketing hysteria over the latest and newest threats, as well as the headlines of the most recent business to be breached. It’s no surprise, then, that it’s hard to keep up.We are now, more than ever, reliant on our technology. But with that reliance comes the need to ensure it’s safe and secure usage. Here are the key cyber security trends to watch out for this year.

The avalanche of cyber security: How to identify the real threats Read More »

Back to basics: simple tips for preventing cyber crime In your business

In this increasingly complex cyber world, there are, however, some basic tips to ensure you have the foundations set to avoid costly scams and sanitise your digital footprint.
We are now, more than ever, reliant on our technology. But with that reliance comes the need to ensure it’s safe and secure usage. Here are the key cyber security trends to watch out for this year.

Back to basics: simple tips for preventing cyber crime In your business Read More »

Phish of the Month – Coronavirus Scams

Coronavirus scams

At least 3.4 billion phishing emails are sent worldwide each day and unfortunately, this includes the utilisation of international tragedies. Cyber criminals are cashing in on the global coronavirus epidemic by sending misleading phishing emails to exploit unsuspecting readers. The coronavirus (COVID-19) outbreak, is now affecting 43 countries around the world and has over 81,280

Phish of the Month – Coronavirus Scams Read More »

What are the Collections Breaches?

In January, security researcher Troy Hunt announced the addition of the ‘Collection #1’ set of compromised login credentials to his Have I Been Pwned (HIBP) service. HIBP allows users to search for their own email addresses and passwords in order to identify whether they have appeared in any major data breaches. This was followed shortly afterwards by coverage of ‘Collections #2–5’. Here we’ll explain why these collections are a big deal, and the steps you can take to protect yourself.

What are the Collections Breaches? Read More »

Scroll to Top