Blog

RECENT POSTS

HOW TO BUILD AN EFFECTIVE CYBER SECURITY STRATEGY

The digital age has brought many benefits and opportunities to organisations, allowing transformation into new markets, building in areas of efficiency and resource, as well as introducing new methods of delivering product to end users....

Read more

What You Need To Know To Invest In Cryptocurrencies

INTRODUCTION Cryptocurrencies are virtual or digital assets that can be used to purchase goods and services or represent the value of an asset. Like Forex trading, where currencies can be paired against each other to...

Read more

BLOCKCHAIN & CRYPTOCURRENCY FUNDAMENTALS

INTRODUCTION Stocks & shares has been a continual source of discussion for decades on how to get rich quick, and other investment advice, some by professional companies and others by freelancers. With the rise of...

Read more

The OWASP Top 10 Vulnerabilities & How To Prevent Them

INTRODUCTION With the continual demand and growth for web and mobile based services, the application development sector is one of the hottest and fastest growing around. Often security is overlooked in favour of rich and...

Read more

HOW THE SECURE SOFTWARE DEVELOPMENT LIFECYCLE (SDLC) CAN TRANSFORM YOUR BUSINESS

INTRODUCTION If you haven’t already realised, we live in a digital age with 10 billion active Internet of Things (IoT) devices reported worldwide, larger than the population of the world itself. With the growth of...

Read more

The Challenge Of Data Breaches – And Why SMEs Aren’t Exempt

INTRODUCTION Cyber-attacks are now becoming more publicly reported, with greater widespread attention through mainstream media.  The most common attacks that tend to be reported are around data breaches and systems outages, since these have the...

Read more

Cloud Security: How To Keep Your Cloud Environment Secure

Introduction With more organisations adopting some elements of cloud services, and some migrating fully into the cloud to take advantage of the services offered at cost effective prices, cloud service providers have continued to grow...

Read more

How To Catch A Phish

INTRODUCTION Working in the Cyber Security sector there are many topics I discuss with people when talking about the work I do, and admittedly a lot of it sounds like complete jargon. One topic that...

Read more

CYBER SECURITY HYGIENE FOR EVERYONE

INTRO As an Information Security Professional, cyber security hygiene has been drilled in from day one. So much so that best practices have been brought over into personal daily life, which can only be a...

Read more

Brand Design – How To Stand Out In A Virtual World

Introduction 2020 was the year everything changed except this time it didn’t just affect a handful of people or countries, it affected the whole world. Those from the United Kingdom will no doubt remember Boris...

Read more