Cyber Security BLOG
CYBER SECURITY insightCyber Security insight and all you need to know about cyber security fresh from our team of experienced consultants and guest writers. Covering everything from opinion to regulations and training you won’t need any other cyber security blog!
Log4j Vulnerabilities & what do I need to ask?
You may have read a lot in the news about threats to your business from Log4j attacks against in VMware Horizon server environments…but what does this mean in reality for your organisation? Log4j, is an open-source logging library affecting almost all software which...
Hiring a vCISO can strike the right security resource balance…
Hiring a vCISO can strike the right security resource balance as today all organisations handle sensitive information or rely on data that has value to someone, whether it be the data owner or the individuals and organisations the information is about. We all have an...
Is hiring a CISO right for your organisation?
Before we look at whether it’s right for your organisation to invest in hiring a Chief Information Security Officer (CISO) it’s important to understand what a CISO is and some of their core responsibilities. The CISO is a board level role responsible for leadership...
Cyber Security for Service Providers
Running a business today often requires plugging in to and partnering with a wide array of service providers to ensure they can meet both the demands of your customers and remain competitive. Whether those partners are providing IT Services, website development,...
Cloud Services – Getting it right
As we are again in a period of change regarding our working practices and seeing many more people working remotely, cloud services are going to be high on the cyber security agenda once more. One benefit cloud services provides for remote working is that staff can...
CyberScale join the Cambridgeshire Chamber
CyberScale are pleased to announce that we are now a member of Cambridgeshire Chambers of Commerce, a step we have taken to help increase our reach across the UK and develop relationships with a range of organisations and businesses across Cambridgeshire. We know we...
The Importance of Multi-factor Authentication
As IT technologies and trends evolve, the threat landscape that businesses face evolves right along with them. Multi-factor authentication is now commonplace in our daily lives as businesses try and keep our data secure, but before we dive in to what it is and how it...
Getting the most from your Antivirus
With the ubiquitous nature of antivirus solutions across work and home devices & systems, a frequently asked question in cyber security is “which is the best antivirus to use?”, whether that's for a small business, a large business or even for use at home. The...
Preparing to respond to a Cyber Attack
It is not possible to allow for every scenario when it comes to cyber security incident response management, but having the right processes in place can alleviate some of the panic which often ensues during an incident. A well-prepared plan affords both management and...
Mitigating Supply Chain Cyber Security Risks
Building awareness of cyber security risks within your organisation and supply chain is an absolute must in today’s complex web of systems and services required to run a business of any size. Becoming aware, and subsequently realising that you need to take action to...
Government Cyber Strategy
There is no new news in acknowledging that we are all living in an increasingly connected world, whether that be at home, work or in education. What is evolving, almost on a weekly basis, however are the threats we all face at a personal, business and national level...
Cyber Security Threats in the Supply Chain
Most companies can no longer function and remain competitive without relying on some form of software or system that is owned or supported by another organisation. Supply chain security has rapidly evolved from focusing on the protection of physical security to...
Supply Chain Cyber Security
All businesses, schools, healthcare providers and charities sit within a supply chain that encompasses a myriad of service and systems providers that enable them to operate as they do. It is therefore the reality that every one of these has risk introduced to it by...
The varying costs of a cyber attack
According to the dictionary definition a Cost is “an amount that has to be paid or spent to buy or obtain something”, which might not obviously hold true when thinking about investing in protecting your business from a cyber attack, or indeed in paying to regain...
Training Services Growth
Following the development of bespoke cyber security training services for a number of our clients it was clear that there was a need within businesses for courses and workshops that supported their cyber security journey from the very early stages, through to those...
Data Security for your Business
“Data is the new oil” is a phrase you may have heard bandied around in recent times. In our increasingly connected lives both at home and work, and with the rise of Artificial Intelligence and automation, data is everywhere and data security is integral to the...
Cyber Security Strategy & Collaboration
Cyber security strategy from a client perspective: As a social housing and care provider, our client Orwell Housing Association Ltd understands that risk management and good governance is key to ensuring that the organisation meets its strategic objectives. As part of...
Ransomware – the ever increasing threat
Ransomware is still on the rise. Not only that, but concerningly success rates seem to be up. With well-known brands such as Kia Motors, Acer Computers and Accenture Consulting being hit by Ransomware attacks so far in 2021, we...
A Consultants Perspective on Cyber Security
As Cyber Security Awareness Month 2021 has now ended we got to thinking "what's it like to be a cyber security consultant?" so wanted to share some of the experiences and thoughts of our consultants who are working with clients and businesses every day. Let’s see what...
Ransomware threats in Healthcare
This article provides an insight in to the way the ransomware group FIN12 conducts their “business”. Focusing on high value victims, and quick deployment, FIN12 is a threat actor focused on making money regardless of which organisations, and the potential damage to...
CyberScale LTD • Company no. 04493885 • Registered in England
Royal Norfolk Agricultural Association Showground Dereham Road, Norwich, England, NR5 0TT