The Beginners Guide to the NHS DSP Toolkit
Organisations must have completed the DSP Toolkit if delivering services under an NHS contract. Read on to discover the basics and what is involved.
Why law firms and the legal sector are such an attractive target for cyber criminals - and what to do about it.
Cyber security across the legal sector has a number of particular challenges given the very sensitive information and the high value of transactions routinely handled by law firms and solicitors practices.
How secure backup is vital to your cyber-security strategy.
Cyber-security has traditionally been seen as a “technical” problem with little interest for the business. Not any more! In recent years, the prevalence and growth of threats like ransomware have seen cyber-security catapulted to the forefront of mainstream business consciousness.
The Cyber Security perspective on Mergers, Acquisitions and Investments.
If you are involved in the mergers and acquisitions of companies, or investment in SAAS and software development companies, then I’m sure you have excellent and well-practiced due diligence processes for the financial elements of the business. But does your due diligence adequately cover the security position of what it is you are spending all the money on? Don’t spend huge amounts of money on buying a security nightmare.
Web Entrepreneurs: How can good cyber security make your cloud web app more valuable?
In the excitement of building a new cloud application, how many entrepreneurs actually consider putting cyber security at the heart of their development process? And what does that do for their investment opportunities?
How to secure Microsoft Office Desktop Deployments – A Technical Guide.
Malicious Office malware has surged over the past year with a 199% increase between Q3 and Q4 of 2020 alone. Now more than ever there is a need to protect assets or risk irrecoverable loss.
Communicating Cyber Security Risk to the Board.
Communicating cyber security risk to the board can be a key function of senior security roles. This guide provides 10 tips that can help.
7 Steps To Secure Your Microsoft 365 Environment
This guide outlines 7 simple configuration changes that significantly increase the security of your Microsoft 365 environment.
The Beginners Guide to Vulnerability Triage
This guide provides steps that can be taken for an organisation looking to implement a basic vulnerability triage process.
Extending Your Test Automation Pack Into Security
The client did not want or need DevSecOps. What they wanted and needed was an ability to test in an automated manner, adding security testing into their existing test processes by expanding upon their existing automation capabilities.
Vulnerability Remediation - Do Not Forget Regression Testing
Extensive regression test coverage allows us to take and test changes quickly. It means even when the pressure is on to ’get it in’, we can still be safe in the knowledge we will not take the product backwards in our haste to be secure.
WooCommerce Subscriptions Persistent XSS (CVE-2019-18834)
WooCommerce Subscriptions Persistent XSS (CVE-2019-18834)