Home / Blog
Managing third-party risk is inevitable when you work with vendors, suppliers, contractors, and business partners. And the harrowing thing is that you have no control over their networks or security. On-off or snapshot assessments of third-party risks still leave your business vulnerable as neither your business nor the third-party’s operates in a static environment. As things change in real time, you need real-time intelligence to manage third-party risk in your firm.crime cybersecurity
Cyber-crime in the UK is on the rise. And the readiness of most firms to meet these challenges leave much to be desired for many local and regional businesses. In the UK alone, the Cabinet Office has estimated the cost of cyber-crimes on the economy at £27bn. At least an estimated £9.2bn of that is related to just the theft of IP from UK businesses. Companies bear the brunt of these financial losses.security insider-threat CISO
With insider threats, your biggest assets become your biggest risks. One of today’s most damaging security threat comes from trusted insiders. Insider threats can come from anyone in your organisation, from those with the highest access to your company data to those who you think have no access at all. Your insiders are both employees and third parties. The risk is at all levels. Its no wonder that 25% of all security incidents involve company insiders.cybersecurity malware security
We recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.
It’s strange to be writing a blog; as a Security focused company so much of what we do is highly confidential that one gets accustomed to not talking about what we do. Those that work with us, know what we do. Those that don’t, don’t need to. But now we’re developing some products, products for the commercial market. It’s an exciting time for us, opening up to a new market and bringing our somewhat unique view of the world to bear.
Topicsai atlassian best-practices ciso climate-change cloud covid19 crime crypto culture customer-success cybersecurity data-protection development dlp employees gdpr insider-threat malware office365 remote-working security semafore slack social-media technology work-experience
As competition continues to get tougher, businesses look for new ways to stay ahead of the game. Thanks to technology, businesses of any size have acc...
The COVID-19 pandemic has affected the lives of many people on all fronts. Besides making the importance of health and immunity more evident to all, i...