Hook, Line and Sinker: Protecting Your Business from Email Phishing

A Not So Perfect Catch At CyberUK 2019, phishing was identified as one of the major threats facing the UK in 2019. Phishing is an act of cybercrime in which users are tricked into providing sensitive data. This includes personal data such as passwords, bank account...

Using the Toyota Approach to Building Trustworthy Products

Toyota has gained a reputation worldwide for consistently producing high-quality vehicles. This reputation has been built through a dedicated approach to quality control and assurance. Toyota’s founder, Sakichi Toyoda, once said: “a product should never be sold until...

What Is A Security Audit?

Implementing good cyber security involves more than just implementing technology. You need appropriate supporting policies/processes and well-trained staff to follow them. This typically all comes together in what is referred to as a Security Management System. To be...

Cyber Essentials – Where To Begin?

What Is Cyber Essentials? Cyber Essentials is a government-backed scheme, operated by the National Cyber Security Centre. The scheme highlights the baseline of good security practice and helps to teach businesses how to protect themselves from online threats. There...

PANDORA: the single cable to desktop challenge

PANDORA: The single cable to desktop challenge August 2017 PANDORA is a concept demonstrator programme undertaken by the UK Ministry of Defence, as part of the C4ISR Secure Information Infrastructure and Services (CSIIS) research programme, to remove the risk from...