Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?

Covid-charity Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?
A number of charities have their IT foundations built on historical infrastructure and systems which are hard to appropriately protect. Within the cur...
Continue reading

Stay Alert! Developing a secure home office

Remote-Working-Checklist-Blog3-header
Organisations around the world are moving closer and closer to establishing a new standard of best practice for remote working, with new tools and pro...
Continue reading

Your launchpad - choosing the right tools for remote working

Remote-Working-Checklist-Blog2-header
​In recent weeks, companies across the UK have found themselves transitioning to a remote workforce with little to no choice, despite the approach pre...
Continue reading

Playing your part - staying secure while remote working

Remote-Working-Checklist-Blog1-header
Now more than ever, digital security is a team effort, with staff at all levels of an organisation having an active part to play in keeping critical b...
Continue reading

Rising cyber security threats in manufacturing

Manufacturing-stories

Cyber professionals say that companies involved in the manufacturing industry are more exposed to cyber-attacks. This was revealed by a number of studies produced by the Manufacturers Alliance for Productivity and Innovation (MAPI). According to MAPI; 40% of manufacturing firms experienced a cyber-attack within the last year. Of those attacked, 38% of them suffered over $1 million in damages. 

Continue reading

Cyber crime: ransomware attacks

Ransomware-banner
 Ransomware is malware that encrypts an individual's files so that they no longer have access to them, and subsequently demand payment for the fi...
Continue reading

Phishing: attacks and prevention

Phishing-attacks

Phishing is the fraudulent use of electronic communications to try and obtain sensitive information, such as usernames, passwords and credit card details by posing as a legitimate institution. Phishing attacks attempt to get individuals to click on a malicious link and enter confidential information to steal their identity, funds or to be the first step in a serious cyberattack against an organisation.

Continue reading

The importance of securing your data - Part 2: Data Loss Prevention tools

The-importance-of-securing-your-data-Part-2-Data-Loss-Prevention-tools

All organisations store data, and regardless of whether it's a recipe or an algorithm, this data is an organisation's most prized asset, which is why hackers make it their target. The Cyber Security Breaches Survey 2019 from the Department for Digital, Culture, Media & Sport (DCMS) found that 32% of businesses identified cyber security breaches or attacks in the last 12 months, which have cost an average of £4,180 in lost data and assets

Continue reading

The importance of securing your data - Part 1: Privacy and compliance

The-importance-of-data-loss-prevention

Cybercriminals are only getting more cunning and skilful with their cyber attacks, which is bad news for organisations when it comes to meeting privacy and compliance regulations. There can be significant legal implications for organisations if their data is not secure and regulations are not met. For instance, since the GDPR (General Data Protection Regulation) came into effect in May 2018, data protection regulators have imposed 114 million euros (approximately 97 million pound) worth of fines under the GDPR regime (GDPR Data Breach Survey 2020 by DLA Piper).

Continue reading

The future of CSOC: Threat Intelligence

The-future-of-CSOC-Threat-Intelligence

​ Organisations generate millions of system logs every day from the likes of servers, firewalls and network devices. Their ability to process, analyse and react to this information affects how they will manage any security risks and incidents. To help process this data, many organisations implement a Security Incident and Event Management (SIEM) system or outsource to a Cyber Security Operations Centre (CSOC) for their monitoring, which provides a real-time analysis of security alerts.

Continue reading

Cyber breach prevention

cyber-security-advisory

With cyber breaches growing in volume and frequency (Carbon Black reported that 88% of UK organisations suffered a breach in 2018) you can guarantee that your organisation will be targeted by cybercriminals at some point.

Continue reading

© 2020 Exponential-e Ltd. Reg. No. 04499567, Reg. Address:100 Leman Street, London E1 8EU