Articles
How a SOC Can Help SME’s Punch Above Their Weight in Cybersecurity
In this must-read breakdown, discover why hackers are targeting SMEs, the high price of unprotected data, and how a 24/7 Security Operations Centre could be the game-changer your business needs to…
What does Security Architecture do?
It’s hard to be confident that not only is your business protected, but that you’re protecting the right things, making the right security decisions, spending your security budget in the right…
A guide to Microsoft Teams templates and teams
Microsoft Teams can be an extremely valuable collaboration and communication tool, with a key feature being the ability to create a ‘team’.
Five penetration testing myths
According to the NCSC, penetration testing is “a method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools…
Cyber report spotlight: DDoS-as-a-Service used in six-day DDoS attack
A July a Distributed Denial of Service (DDoS) attack on Microsoft which led to availability issues, was amplified, rather than prevented, by its DDoS protection.
Cyber report spotlight: Security firm accidently hires North Korean hacker
The security engineer a security firm recently hired within its internal AI team turned out to be a North Korean threat actor, who immediately began loading malware to his company-issued…
Top five M365 Misconfigurations
We’ve completed countless Microsoft 365 security reviews for organisations of all sectors, sizes and locations, and there are five misconfigurations we see regularly.
Cyber report spotlight: CrowdStrike update causes worldwide outages
A CrowdStrike update on 19th July caused major disruption to Windows devices across the world, with Airplanes grounded and critical services unavailable.