Skip to main content
Cyber Security Strategy

Five penetration testing myths

According to the NCSC, penetration testing is “a method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools…

Christopher Grosberg
Written byChristopher Grosberg

Top five M365 Misconfigurations

We’ve completed countless Microsoft 365 security reviews for organisations of all sectors, sizes and locations, and there are five misconfigurations we see regularly.

​Cyber report spotlight: CrowdStrike update causes worldwide outages​ ​

A CrowdStrike update on 19th July caused major disruption to Windows devices across the world, with Airplanes grounded and critical services unavailable.​

Cyber report spotlight: 33 million Phone Numbers Stolen In Twilio Data Breach​

​A data breach of 33 million phone numbers associated with the 2FA app Authy, has raised concerns of follow-on phishing attacks.​

Headshot
Written byDan Morrison

Top Five E5 Security features you aren’t using

We see a lot of organisations move to M365 E5 for the extra security features, but they stop after Defender for Endpoint, Defender for 365, and the extra identity security in Entra ID. E5 comes…

Three Peaks for £30k

At the beginning of July, a courageous team from across the business took on the UK Three Peaks Challenge, aiming to complete the challenge in 24 hours, and raise money as part of our 30th…

Bruce Watson Headshot
Written byBruce Watson

Labour, private equity and investment

Working with private equity, investment and financial organisations for several years, we understand that even the smallest changes can have a significant impact, but what does a new Labour…

Richard Hall
Written byRichard Hall

Pulling the plug – are your phone lines about to get switched off?

The analogue telephone network in the UK is getting switched off. As of September 2023, Openreach (formerly part of BT) listed every telephone exchange in the UK as ‘Stop Sell’ for traditional…