top of page
Articles
Some light reading on cyber security, data protection and resilience


Post-Quantum Cryptography: Why you need to do something about it now
Let’s face it: mention “quantum” and most people either think of science fiction or switch off entirely; However, quantum computing is moving from theory to reality. While the term “Post-Quantum Cryptography” may sound intimidating, the risks and opportunities, are practical and immediate for anyone responsible for data, privacy, and resilience.
Jun 103 min read


Continuous Control Monitoring: The Key to Efficient Risk Management and Seamless Compliance
Traditional compliance approaches are time-consuming, reactive, and disruptive to business as usual. Enter Continuous Control Monitoring (CCM): a modern, automated approach that transforms compliance and risk management from a box-ticking exercise, often point-in-time, into a real-time strategic advantage.
May 283 min read


The Role of the Fractional CISO: Bridging the Gap in Cyber Security Leadership
In today’s fast-evolving threat and regulatory landscape, the Fractional CISO is a solid choice for many organisations
Mar 256 min read


Unlocking Your Cyber Security Potential: The Power of Maturity Assessments
Understanding where your organisation stands in terms of cyber security is not just important — it’s essential. A Cyber Security Maturity...
Mar 243 min read


Ben de la Salle Recognised in 2&20's Top 100 List for the Fourth Year
Ben de la Salle, CEO & founder, recognised in 2&20's prestigious list of Top 100 Most Influential People 2025
Mar 51 min read


Twelve Frauds of Christmas
Staying vigilant and informed will help you enjoy a safe and joyous festive period. Have a very Merry Christmas and a Happy New Year
Dec 10, 20246 min read


Personal Cyber Security Checklist
It is Cyber Security Awareness Month, and the October 30th is National Checklist Day! Download our FREE Personal Cyber Security Checklist
Oct 28, 20241 min read


Clean Your Virtual Desktop Day
National Clean Your Virtual Desktop Day is an opportunity to declutter your computer's desktop, and improve productivity
Oct 21, 20242 min read


Cyber Security and Sustainability
Improper management of E-Waste can lead to data breaches, significant impacts on our environment, and, potentially, regulatory fines
Oct 14, 20242 min read


Cyber Security and Mental Health
Cyber Security and Mental Health is closely linked. Cyber security is demanding and fast-paced, with constant threats and challenges.
Oct 7, 20243 min read


Welcome to Cyber Security Awareness Month
Today marks the start of Cyber Security Awareness Month, a month dedicated to helping individuals understand more about the risks they face.
Oct 1, 20242 min read


Cyber Awareness Month
Wondering what to do for Cyber Awareness Month? OR no idea what or when Cyber Awareness Month is?
Then download our FREE Guide
Sep 12, 20241 min read


Charting Your Course: A Guide to Planning Your Cyber Security Program
In today's hyperconnected world, having an effective cyber security program is not optional - it is essential. Cyber security breaches...
Jun 13, 20243 min read


CIS: What is "Reasonable Security"
The Center for Internet Security (CIS) has published its view on what "Reasonable Security" means.
May 29, 20243 min read


Be Cyber Self-Aware: Benefits of a Cyber Security Posture Review
A Cyber Security Posture Review (CSPR) acts as a security health check for your organisation, analysing your current security maturity
May 21, 20243 min read


Cyber 101: Security Hygiene
A significant proportion of cyber attacks are seemingly avoidable, should security hygiene have been in place.
May 7, 20244 min read


Navigating the Storm: Effective Communication During a Cyberattack
Whilst effective preventative and detective security controls are essential, a well-defined communication plan is essential
Apr 29, 20242 min read


Don't Believe the Hype: Cybersecurity misconceptions
Cybersecurity can seem like a complex & expensive subject, but the truth is, there are many misconceptions that leave businesses vulnerable.
Apr 22, 20243 min read


The Guardians: A Look Inside a Cybersecurity Team
Organisations need to build a robust team to ensure they can manage and mitigate cyber risk.
Apr 15, 20243 min read


Shielding Your Inbox: Building a Robust Response to Business Email Compromise (BEC)
Business Email Compromise (BEC) continue to impact businesses of all sizes, exploiting human trust to siphon funds or steal sensitive data.
Apr 9, 20242 min read


Artificial Intelligence: a Double-Edged Sword
The cyber security landscape has always evolved rapidly; However, this is now fuelled by the ever-expanding use of artificial...
Feb 14, 20242 min read


The Dark Side of AI
Artificial intelligence (AI) is rapidly transforming our world, with every facet of our lives being impacted in some way. While AI...
Feb 14, 20242 min read


AI: A Force for Good
While malicious actors wield the potential of artificial intelligence (AI) to launch ever-more sophisticated attacks, AI is increasingly...
Feb 14, 20242 min read


Should your business get Certified
Obtaining industry certifications like Cyber Essentials, ISO27001 or SOC 2 (Type 2) can bring significant benefits to an organisation.
Jan 29, 20243 min read
bottom of page