The Importance of Cyber Security Awareness Training
It is a common misconception that cyber security is an area for IT managers and network admins to focus on. Many organisations that outsource their…
It is a common misconception that cyber security is an area for IT managers and network admins to focus on. Many organisations that outsource their…
There are many arguments about the pros and cons of conducting a simulated phishing exercise within an organisation, with many arguing that they add very…
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
What is it? Charities, small businesses, and public sector organisations hold as much sensitive data as large organisations but rarely have the same resources for…
A new IT security training workshop launched today will give organisations the tools to protect themselves against the reputational risk associated with data leaks. The…
A zero-day (0-day) vulnerability refers to a security risk in a piece of software with no patches or mitigations to prevent cybercriminals from exploiting them….
In recent years, cryptocurrency has seen a massive rise in attention and interest and, for the majority, acts as a legitimate method of payment or…
This article was written and provided to the Scottish Business Resilience Centre by Catriona Garcia-Alis, Senior Associate, Dispute Resolution Team, CMS. I don’t remember the…
Phishing attacks are one of the most common methods threat actors use to gain access to your network and devices. If you have an email…