Skip to content

Article (4)

The Security Risks Of Smart Speakers

Executive Summary The IoT, or Internet of Things, encompasses everything connected to the internet, but is increasingly...

Cyber Essentials Changes: What You Need To Know

Executive Summary The Cyber Essentials scheme provides business and organisations with a certification that assures...

Cyber Essentials Changes: Critical Updates

Executive Summary Cyber Essentials is set to receive its biggest update yet soon, on 24th January 2022. The...

Cyber Essentials Changes: Multi-factor Authentication

Executive Summary On 24th January 2022, the newest requirements for the Cyber Essentials scheme will come into force,...

Cyber Essentials Changes: Cloud Services

Executive Summary On 24th January 2022, the newest requirements for the Cyber Essentials scheme will come into force,...

Cyber Essentials Changes: Home Routers

Executive Summary Since it launched back in 2014, Cyber Essentials has become the cyber security standard for companies...

What is SquirrelWaffle?

Executive Summary SquirrelWaffle is known as a dropper malware, where it would be used to download additional and...

CSA 12 Days of Cyber Christmas

Executive Summary As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your...

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Executive Summary Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a...

This Apple “AirTag” Vulnerability could be harvesting your credentials

Executive Summary During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag....

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Executive Summary Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is...

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Executive Summary Following the global pandemic, the mass migration to remote working was a necessary move. As things...

See Yourself in Cyber this Cybersecurity Awareness Month: Interview With Mina Khatun

In the penultimate installment of our special Cybersecurity Awareness Month interviews, we sit down with one of CSA’s...

The Rising Popularity of NFTs and The Rising Security Threat

Executive Summary The art world is known for being ahead of the curve, adopting new and interesting technologies to...

Is Cyber Training and Education working?

Executive Summary The report from the ICO on the ‘surprising’ decline in personal data breaches has certainly opened up...

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Executive Summary Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis, has been...

How did an unknown hacker steal over $600M in cryptocurrencies in the biggest ever crypto based cyber-attack?

Executive Summary On 10th August 2021, Poly Network announced in a tweet that it had been attacked. Not only had their...

How to Prevent a Ransomware Attack

Executive Summary According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year....

Is your Microsoft M365 service secure from attackers? Are you sure?

Executive Summary The mass migration to remote working as a result of the coronavirus pandemic has seen many...

Covid-19: How to prepare your staff for remote working

Executive Summary Since the initial Covid-19 outbreak, the nation’s workforce had to learn to quickly learn to adapt to...

Covid-19: Cyber Criminals Launch Their Own ‘Virus’

Executive Summary Whilst the world is currently preoccupied with public health, cyber attackers have taken advantage of...