Skip to content

Article (3)

CSA’s Understanding Of The Okta Data Breach So Far

Executive Summary When it comes to the Lapsus$ hacking group’s recent breach of Okta, the access management software...

The Cyber Risks of Connected Medical Devices

Executive Summary Internet of Things (IoT) devices have become ubiquitous in recent years - there are almost as many of...

The Ransomware Gang That You Should Be Watching Out For

Executive Summary Late last year, the FBI issued a warning about the Cuba ransomware group. You may not have heard of...

Emergency Cyber Hygiene Advice

Executive Summary Many businesses are looking to bolster their cyber defences at the moment, as a result of the...

Critical Infrastructure Attacks: Considerations for Small-to-Medium Enterprises

Executive Summary In the UK, Critical National Infrastructure (CNI) is defined by the National Cyber Security Centre as...

The Cybersecurity Risks of Remote Working, Potential Consequences and Mitigations

Executive Summary When the UK government announced all staff could return to offices on the 27th of January 2022, it...

QR Code Phishing Attacks Could be on the Rise

Executive Summary In the world of phishing, there’s a new(ish) player in the game. A survey conducted by Ivanti...

Why you should be on the lookout for BRATA

Executive Summary IA common misconception is that only Windows, macOS, and Linux computers need cyber security in 2022....

Your data that Facebook could be tracking in 2022

Executive Summary It’s well-known that Facebook is one of the biggest players in the Information and Big Data industry....

The Security Risks Of Smart Speakers

Executive Summary The IoT, or Internet of Things, encompasses everything connected to the internet, but is increasingly...

Cyber Essentials Changes: What You Need To Know

Executive Summary The Cyber Essentials scheme provides business and organisations with a certification that assures...

Cyber Essentials Changes: Critical Updates

Executive Summary Cyber Essentials is set to receive its biggest update yet soon, on 24th January 2022. The...

Cyber Essentials Changes: Multi-factor Authentication

Executive Summary On 24th January 2022, the newest requirements for the Cyber Essentials scheme will come into force,...

Cyber Essentials Changes: Cloud Services

Executive Summary On 24th January 2022, the newest requirements for the Cyber Essentials scheme will come into force,...

Cyber Essentials Changes: Home Routers

Executive Summary Since it launched back in 2014, Cyber Essentials has become the cyber security standard for companies...

What is SquirrelWaffle?

Executive Summary SquirrelWaffle is known as a dropper malware, where it would be used to download additional and...

CSA 12 Days of Cyber Christmas

Executive Summary As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your...

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Executive Summary Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a...

This Apple “AirTag” Vulnerability could be harvesting your credentials

Executive Summary During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag....

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Executive Summary Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is...

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Executive Summary Following the global pandemic, the mass migration to remote working was a necessary move. As things...