Making Effective Use Of Zero Trust Security

One year on from our introductory blog on Zero Trust Architecture,  what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...

Getting the Cyber Security Basics Right

Back to the basics with Cyber Essentials Four years is a long time in cyber security; a lot can change in that time. But surprisingly, a lot also stays the same. Back in 2016, the National Cyber Security Centre released a white paper on Common Cyber Attacks: Reducing...

Does SolarWinds Mean Cyber Essentials is Dead?

The King is Dead, Long Live the King! For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber...

Christmas Card Competition 2020

As 2020 draws to a close, we would like to send our Season’s Greetings and wish a very Happy New Year to all our customers. This year has turned out very different to how we all imagined it and there have been massive changes in the way we work. To bring some fun and...

A day in the life of a CISO

What does a CISO at an SME do during their working day? A CISO – Chief Information Security Officer – at an SME is responsible for security operations, securing the business, its technology, and its initiatives, and leading the business’s information security...

Zero Trust – It’s An Architectural State of Mind

What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...