Cyber Security BLOG

CYBER SECURITY insight
Cyber Security insight and all you need to know about cyber security fresh from our team of experienced consultants and guest writers.  Covering everything from opinion to regulations and training you won’t need any other cyber security blog!

Log4j Vulnerabilities & what do I need to ask?

You may have read a lot in the news about threats to your business from Log4j attacks against in VMware Horizon server environments…but what does this mean in reality for your organisation? Log4j, is an open-source logging library affecting almost all software which...

read more

Is hiring a CISO right for your organisation?

Before we look at whether it’s right for your organisation to invest in hiring a Chief Information Security Officer (CISO) it’s important to understand what a CISO is and some of their core responsibilities. The CISO is a board level role responsible for leadership...

read more

Cyber Security for Service Providers

Running a business today often requires plugging in to and partnering with a wide array of service providers to ensure they can meet both the demands of your customers and remain competitive. Whether those partners are providing IT Services, website development,...

read more

Cloud Services – Getting it right

As we are again in a period of change regarding our working practices and seeing many more people working remotely, cloud services are going to be high on the cyber security agenda once more. One benefit cloud services provides for remote working is that staff can...

read more

CyberScale join the Cambridgeshire Chamber

CyberScale are pleased to announce that we are now a member of Cambridgeshire Chambers of Commerce, a step we have taken to help increase our reach across the UK and develop relationships with a range of organisations and businesses across Cambridgeshire. We know we...

read more

The Importance of Multi-factor Authentication

As IT technologies and trends evolve, the threat landscape that businesses face evolves right along with them.  Multi-factor authentication is now commonplace in our daily lives as businesses try and keep our data secure, but before we dive in to what it is and how it...

read more

Getting the most from your Antivirus

With the ubiquitous nature of antivirus solutions across work and home devices & systems, a frequently asked question in cyber security is “which is the best antivirus to use?”, whether that's for a small business, a large business or even for use at home.  The...

read more

Preparing to respond to a Cyber Attack

It is not possible to allow for every scenario when it comes to cyber security incident response management, but having the right processes in place can alleviate some of the panic which often ensues during an incident. A well-prepared plan affords both management and...

read more

Mitigating Supply Chain Cyber Security Risks

Building awareness of cyber security risks within your organisation and supply chain is an absolute must in today’s complex web of systems and services required to run a business of any size.  Becoming aware, and subsequently realising that you need to take action to...

read more

Government Cyber Strategy

There is no new news in acknowledging that we are all living in an increasingly connected world, whether that be at home, work or in education.  What is evolving, almost on a weekly basis, however are the threats we all face at a personal, business and national level...

read more

Cyber Security Threats in the Supply Chain

Most companies can no longer function and remain competitive without relying on some form of software or system that is owned or supported by another organisation.  Supply chain security has rapidly evolved from focusing on the protection of physical security to...

read more

Supply Chain Cyber Security

All businesses, schools, healthcare providers and charities sit within a supply chain that encompasses a myriad of service and systems providers that enable them to operate as they do.  It is therefore the reality that every one of these has risk introduced to it by...

read more

The varying costs of a cyber attack

According to the dictionary definition a Cost is “an amount that has to be paid or spent to buy or obtain something”, which might not obviously hold true when thinking about investing in protecting your business from a cyber attack, or indeed in paying to regain...

read more

Training Services Growth

Following the development of bespoke cyber security training services for a number of our clients it was clear that there was a need within businesses for courses and workshops that supported their cyber security journey from the very early stages, through to those...

read more

Data Security for your Business

“Data is the new oil” is a phrase you may have heard bandied around in recent times.  In our increasingly connected lives both at home and work, and with the rise of Artificial Intelligence and automation, data is everywhere and data security is integral to the...

read more

Cyber Security Strategy & Collaboration

Cyber security strategy from a client perspective: As a social housing and care provider, our client Orwell Housing Association Ltd understands that risk management and good governance is key to ensuring that the organisation meets its strategic objectives. As part of...

read more

Ransomware – the ever increasing threat

Ransomware is still on the rise.  Not only that, but concerningly success rates seem to be up.  With well-known brands such as Kia Motors, Acer Computers and Accenture Consulting being hit by Ransomware attacks so far in 2021, we...

read more

A Consultants Perspective on Cyber Security

As Cyber Security Awareness Month 2021 has now ended we got to thinking "what's it like to be a cyber security consultant?" so wanted to share some of the experiences and thoughts of our consultants who are working with clients and businesses every day. Let’s see what...

read more

Ransomware threats in Healthcare

This article provides an insight in to the way the ransomware group FIN12 conducts their “business”.  Focusing on high value victims, and quick deployment, FIN12 is a threat actor focused on making money regardless of which organisations, and the potential damage to...

read more

CyberScale LTD • Company no. 04493885 • Registered in England

Royal Norfolk Agricultural Association Showground Dereham Road, Norwich, England, NR5 0TT

Join our Cyber Insights mailing list