Cyber Security BLOG
CYBER SECURITY insightCyber Security insight and all you need to know about cyber security fresh from our team of experienced consultants and guest writers. Covering everything from opinion to regulations and training you won’t need any other cyber security blog!
Hiring a vCISO – their responsibilities and the benefits
In previous blog posts we’ve explored whether hiring a direct resource to support your cyber security strategy is the best approach, or whether outsourcing this role meets your needs. Now let’s dive in a little deeper and look in to how putting in place a vCISO...
Video – Understanding the importance of cyber security training
Cyber training is a powerful tool available to all organisations. When building cyber security defences it's important to ensure that one of your greatest protective assets, your people, are invested in and able to do everything possible to protect valuable data,...
Cyber Security Leadership
Let's take a quick look at cyber security leadership...Here’s an interesting question to ponder for a few minutes. How much value do you place on 3 hours of your time as a business or organisational leader? Maybe you thought along the lines of “that’s nearly half a...
Cyber security in the recruitment industry
Cyber criminals like to be able to target organisations where they can access large amounts of sensitive information and have a deep impact with the attack – the recruitment sector is a prime example. Candidate data is the most valuable intellectual property asset...
CyberScale & Natwest Business discuss why cyber security is important for smaller businesses
In the latest edition of Talking Business with Andy Gray, Local Enterprise Manager at Natwest Business our Director & Principal Consultant Darren Chapman talks about why cyber security is really important and what smaller businesses can do to better protect...
What triggers the need for cyber security training?
It’s not new news that all business leaders, and indeed employees, have a responsibility to protect themselves and the organisation from cyber threats targeting critical data. However, what remains an issue is the level at which businesses are investing in their...
Webinar: Cyber security -why should I care?
In this webinar our Director & Principal Consultant Darren Chapman explores why cyber security is an area all businesses need to give consideration to, increasing your cyber resilience should be a key focus in the face of so many threats to your business. He also...
The human element of cyber security risk
Protection from cyber-attacks is often focused heavily on securing IT systems & devices and tightening processes. Whilst both of these are vital elements of an effective security strategy, there is one other critical component of data & information security...
How valuable is a piece of paper – the value of certifications
How valuable are cyber security certifications?... We are excited to be a part of the Cyber Brew series with Allowlist, and in our first chat with Lee our Director Darren Chapman discusses what value you can put on certifications such as ISO 27001. Are they just...
Cyber resilience comes in many forms
Cyber resilience has become a hot topic as the prevalence of cyber threats now permeates all industries and sectors, no longer is it the preserve of high value targets – all organisations and businesses are targets, including schools, healthcare providers and critical...
Building Cyber Security Training
Knowing that you should be investing in cyber security training versus understanding how a training partner can deliver what your organisation needs, can be a challenge even for those working within training or cyber security. In this article we hope to give you some...
Log4j Vulnerabilities & what do I need to ask?
You may have read a lot in the news about threats to your business from Log4j attacks against in VMware Horizon server environments…but what does this mean in reality for your organisation? Log4j, is an open-source logging library affecting almost all software which...
Hiring a vCISO can strike the right security resource balance…
Hiring a vCISO can strike the right security resource balance as today all organisations handle sensitive information or rely on data that has value to someone, whether it be the data owner or the individuals and organisations the information is about. We all have an...
Is hiring a CISO right for your organisation?
Before we look at whether it’s right for your organisation to invest in hiring a Chief Information Security Officer (CISO) it’s important to understand what a CISO is and some of their core responsibilities. The CISO is a board level role responsible for leadership...
Cyber Security for Service Providers
Running a business today often requires plugging in to and partnering with a wide array of service providers to ensure they can meet both the demands of your customers and remain competitive. Whether those partners are providing IT Services, website development,...
Cloud Services – Getting it right
As we are again in a period of change regarding our working practices and seeing many more people working remotely, cloud services are going to be high on the cyber security agenda once more. One benefit cloud services provides for remote working is that staff can...
CyberScale join the Cambridgeshire Chamber
CyberScale are pleased to announce that we are now a member of Cambridgeshire Chambers of Commerce, a step we have taken to help increase our reach across the UK and develop relationships with a range of organisations and businesses across Cambridgeshire. We know we...
The Importance of Multi-factor Authentication
As IT technologies and trends evolve, the threat landscape that businesses face evolves right along with them. Multi-factor authentication is now commonplace in our daily lives as businesses try and keep our data secure, but before we dive in to what it is and how it...
Getting the most from your Antivirus
With the ubiquitous nature of antivirus solutions across work and home devices & systems, a frequently asked question in cyber security is “which is the best antivirus to use?”, whether that's for a small business, a large business or even for use at home. The...
Preparing to respond to a Cyber Attack
It is not possible to allow for every scenario when it comes to cyber security incident response management, but having the right processes in place can alleviate some of the panic which often ensues during an incident. A well-prepared plan affords both management and...
Mitigating Supply Chain Cyber Security Risks
Building awareness of cyber security risks within your organisation and supply chain is an absolute must in today’s complex web of systems and services required to run a business of any size. Becoming aware, and subsequently realising that you need to take action to...
Government Cyber Strategy
There is no new news in acknowledging that we are all living in an increasingly connected world, whether that be at home, work or in education. What is evolving, almost on a weekly basis, however are the threats we all face at a personal, business and national level...
Cyber Security Threats in the Supply Chain
Most companies can no longer function and remain competitive without relying on some form of software or system that is owned or supported by another organisation. Supply chain security has rapidly evolved from focusing on the protection of physical security to...
Supply Chain Cyber Security
All businesses, schools, healthcare providers and charities sit within a supply chain that encompasses a myriad of service and systems providers that enable them to operate as they do. It is therefore the reality that every one of these has risk introduced to it by...
The varying costs of a cyber attack
According to the dictionary definition a Cost is “an amount that has to be paid or spent to buy or obtain something”, which might not obviously hold true when thinking about investing in protecting your business from a cyber attack, or indeed in paying to regain...
Training Services Growth
Following the development of bespoke cyber security training services for a number of our clients it was clear that there was a need within businesses for courses and workshops that supported their cyber security journey from the very early stages, through to those...
Data Security for your Business
“Data is the new oil” is a phrase you may have heard bandied around in recent times. In our increasingly connected lives both at home and work, and with the rise of Artificial Intelligence and automation, data is everywhere and data security is integral to the...
Cyber Security Strategy & Collaboration
Cyber security strategy from a client perspective: As a social housing and care provider, our client Orwell Housing Association Ltd understands that risk management and good governance is key to ensuring that the organisation meets its strategic objectives. As part of...
Ransomware – the ever increasing threat
Ransomware is still on the rise. Not only that, but concerningly success rates seem to be up. With well-known brands such as Kia Motors, Acer Computers and Accenture Consulting being hit by Ransomware attacks so far in 2021, we...
A Consultants Perspective on Cyber Security
As Cyber Security Awareness Month 2021 has now ended we got to thinking "what's it like to be a cyber security consultant?" so wanted to share some of the experiences and thoughts of our consultants who are working with clients and businesses every day. Let’s see what...
Ransomware threats in Healthcare
This article provides an insight in to the way the ransomware group FIN12 conducts their “business”. Focusing on high value victims, and quick deployment, FIN12 is a threat actor focused on making money regardless of which organisations, and the potential damage to...
A Spotlight on Personal Online Safety
During Cyber Security Awareness Month there might be lots of talk about Cyber Security, Information Security, Data Breaches, Cyber Attacks, it could all get a little overwhelming, possibly scary and eventually feel like it doesn’t really relate to us or impact our...
Cyber Security Consultancy – We do the boring stuff…
As a cyber security consultancy there have been a few conversations recently at CyberScale about the work we do not being at the “sexy end of cyber security”, so this got us thinking about what this really means for us. Although we see large scale cyber-attacks...
Resilience & Prevention Are Central To Cyber Defences
There is no one size fits all, quick and forever fix when it comes to keeping your business or your personal life safe and secure from Cyber Threats. For businesses it’s key to ensure that you are as resilient as possible in the face of a potential cyber-attack or...
Keeping Your Incident Response Plan Alive
Published in 2020, Statistia.com report that only 16% of UK businesses surveyed had any form of cyber security incident management process in place, what we commonly call an Incident Response Plan (IRP). This number is pulled down by only just over a third (38%) of...
The Importance of Incident Response Management
Cyber Attacks may seem like something that happen to other businesses, maybe you don’t think your business is a hot enough target, or that your IT department is handling it so all will be well. This sort of thinking can bring...
Norfolk Chamber B2B Exhibition 2021
As we all get comfortable with the idea of meeting in person again, the CyberScale Cyber Security team are busily getting ready for the Norfolk Chamber B2B Exhibition on 14th October. As the threat from Cyber Attacks to businesses across the UK continues to grow the...
What should an Information Security Policy contain?
The purpose of any information security policy is to outline the standards for processes and technical measures that are implemented in an organisation. They in-turn are derived from an organisation’s overall security strategy; this ensures that an organisation’s...
Choosing your Cyber Security Approach
Regardless of whether you’re new to business or leadership, or you have been in business for a while, when you first start to take your cyber security approach seriously, you may well discover that your first challenge is where to start. There are many different...
Training is central to a Cyber Security Strategy
It would be very easy, and not at all surprising to witness, to get oneself in to a panic and high state of fear relating to the risks of cyber crime to your own business, or your employer, especially if you are in a position of responsibility relating to data,...
Supporting Business Owners & Leaders
Business owners and leaders are constantly learning new things and as a relatively recent business owner I am no exception. I am always seeking advice, and trying to find the best people to help me make the business a success. A great example is marketing. Coming...
Bespoke cyber security training delivered to Flagship Group
Flagship Group, a large housing provider in the East of England, came to us with a need for additional bespoke cyber security training. Flagship wanted the training to complement their online awareness training and phishing campaigns that were already in place. The...
Client Led Cyber Security Training Services
As a cyber security consultancy we also provide cyber security training services, and we are very much led by our clients and their business needs. We don’t have technical solutions to push and always begin with looking at their current technologies, processes,...
People as your strength – a culture of security
“Your people are your biggest weakness when it comes to security”. You’ve probably heard this statement more than once. It probably wouldn't instil the most positive cyber security culture. We believe that this can, and should be a fallacy in all businesses when it...
Keeping ahead, investing across the business
Cyber & information security training is a key tool in defending your business, but before we look at that let's look at the threats facing you... Whether you’re new to running a business, new to your role, or you’ve been in business for a while and you’re...
The time is now to start your cybersecurity journey
For many it can be a daunting step to take in starting your cyber security journey when the realisation comes that you need to do more to protect your business, teams and customers from the ever growing risks associated with cyber-attacks. And herein lies an ongoing...
Three pillars to embedding a culture of security in to your business
According to a 2019 survey published by statista.com of over 1500 UK businesses only 27% of businesses had invested in security training for their staff within the previous 12 months. This got us thinking about the relationship between the culture in a business, its...
Cyber Security – Don’t Waste Your Money
If you’ve been watching the news recently, you’ll be aware that cyber security related incidents and data breaches are happening more and more frequently. Over time, organisations, particularly larger enterprises, have come to understand the importance of...
Regulatory Responsibilities
Adhering to cyber security regulations has never been more important - The Cyber Security Breaches Survey 2020 released in March 2020 confirms cyber security breaches are becoming more frequent. It found 46% of UK businesses and charities reported a cyber-attack...
Cybersecurity Maturity
As Cyber threats evolve, so must businesses also evolve their cyber security maturity, capabilities and defences.An organisation's ability to defend itself is often linked to how mature they are perceived to be, in terms of cyber security. But how can cyber security...
Cyber Security Training
Organisations looking to boost their Cyber Security defences could be forgiven for pouring time, effort and budget into Technical solutions, and ignoring something as powerful as cyber security training. After all, the Cyber battlefield is typically considered a...
Incident Response Planning
Cyber Security tends to be focused mainly on prevention of Cyber related crime, and whilst this is critically important, it's increasingly clear that it is simply not possible to be 100% "Secure". However much preventative work you do, there will always be a residual...
Securing the Cloud
Whether its Office 365, Box or Salesforce, or whether you run all your workloads in the cloud on AWS, Azure or GCP- do you know how to tackle the issue of cloud security? Cloud service vendors will tell you what tools are available to help you secure your share of...
Cloud Security
The decision to take your business into the Cloud is a business decision. It's technology-based sure, but it's just one of many technical solutions that you could implement to meet the requirements of your business. Used right, it can help drive your business goals-...
Culture of Security
There is no single answer to the question of how best to secure your business - no firewall or security software can claim to nullify all threats or mitigate all risks. Important as it is, Technology is just a single weapon in your business security arsenal, you need...
Cyber Security for Business Owners
Cyber Security is not an IT problem, It's a Business problem - and if you're a business owner or part of the leadership team that means it's your problem. Strategy for Business growth, mitigating risks and staying ahead of the competition are all familiar topics for...
Data Backups – Are Yours Fit for Purpose?
When devising the best strategy to back up data in your business there are several key things you should consider: What data is critical to your business? What do you need to protect that data against? How long can your business stand to be without that data? In...
Securing Post-Covid Business Strategy
Regardless of size or industry, chances are the Coronavirus pandemic has changed the way your Business does business. Whether it is the services and products you provide, how you provide them, or just working out how to keep your staff working- adapting your business...
Ransomware – When Victims Pay, Everybody Pays
Ransomware is big business, and business is certainly booming for cyber criminals. It's becoming all too frequent to hear of the next large corporation to be hit with a Ransomware attack, taking down services and putting the personal data of millions of customers at...
Top Tips for Remote Workers
If like many, part of your 'new normal' is spending more time remote working then you are likely being asked to take more responsibility for keeping your company’s devices and data secure when working away from the office. So what can you do to make sure you keep...
Cyber Threats Don’t Care
All too often when speaking with small business owners, we hear how Cyber Security is not a major concern. Cyber threats just aren't on their radar. Cyber Criminals only go for targeted attacks against big organisations with huge assets and valuable data right? Why...
Cyber Security Needs a Strategy
Many organisations are great at thinking strategically when it comes to their overall business but neglect to follow the same approach when it comes to Cyber Security Strategy, instead employing tactical “solutions” – or none at all. This is a key reason why despite...
Darren Chapman – A 60 Second Interview
CyberScale was founded by Darren Chapman, let's take some time to get to know him. Tell us briefly about your background in IT? I’ve been in IT for longer than I care to remember (it’s more than 20 years!), in a range of roles from 1st line support through to managing...
Who Are CyberScale?
About CyberScale At CyberScale, we understand security. We also understand that cyber security and data protection can be confusing and hard to keep up with, especially without dedicated experienced staff. We’ll translate cyber threats and regulations into what’s...
Should you stop using Zoom?
Zoom security issues are in the news Over the last couple of weeks, there have been a significant number of posts, articles, commentaries and opinions about security issues with Zoom. No-one, Zoom included, could have predicted the meteoric rise in the adoption of...
Secure Remote Working – in a hurry
Secure remote working has become a hot topic in the security and IT worlds recently, it's something that right now all businesses need to take time to understand. It's a new world Global concern around the spread of Coronavirus (Covid-19) is forcing organisations...
CyberScale LTD • Company no. 04493885 • Registered in England
Royal Norfolk Agricultural Association Showground Dereham Road, Norwich, England, NR5 0TT