We don’t block, we anticipate and defend – and we instil a lasting legacy of security awareness, too, through security posture assessment, testing, Virtual CISO (VCISO) services, and security training for your people.
We predict cyber attackers’ first and next moves, constantly refocusing our experts’ analysis, monitoring, detection and response where the risk to your people, assets and revenues is greatest.
You’re busy running an organisation – so leave the cyber security to us.
From Managed Security Services (MSS) to Managed Detection and Response (MDR), Managed Privilege Access Management (MPAM) to Managed Cloud Services and Endpoint Management – the pattern is clear: when it comes to defending you against cyber threats, it’s on us, 24x7x365.
Your cyber vulnerabilities exposed – before they expose you.
Penetration Testing, combined with Threat Modelling, Perimeter Assurance and Testing, User Awareness Testing, and simulated attacks, are just a few examples of how we highlight your security weaknesses before attackers exploit them. Expert, actionable advice on next steps is all part of the process.
This week's top stories
You may recall in June we speculated that ransomware would be on President Biden’s agenda when he met President Putin in Geneva. We suggested that ‘the Biden administration is likely to use the opportunity to put further pressure on the Russian government to assist in closing down the criminal networks benefitting from ransomware attacks’
In the summer of 2015, a hacker group called Impact Team decided to take down Ashley Madison (owned at the time by Toronto based company, Avid Life Media) and expose their lax security. Ashley Madison’s high-profile CIO had been proclaiming that the site had amazing security because, as he put it, “It’s not lipstick on our collars anymore getting us caught, it’s digital lipstick; voicemails, text messages [etc.]”.
For decades we have used heuristic methods for analysing data, looking for pre-programed patterns through Boolean based logic: AND, OR and IF. This logic has been critical in automating simple and repetitive tasks usually prone to human error. However, this programmatic approach cannot meet the defence requirements for the current cyber threat.
Being asked to email your card details to gain a refund is not a great process but is something I was asked to do recently. Why not, you might ask? Shaun Wakefield explains.