top of page
Articles
Some light reading on cyber security, data protection and resilience


How to Select the Right Managed Detection and Response (MDR) Provider: A Practical Guide for RFP Success
Learn how to choose the right Managed Detection and Response (MDR) provider with our practical guide. Enhance your RFP success with MDR insights.
Sep 83 min read


CISOaaS: The Flexible Solution for Growing Businesses
Why Security Leadership Matters, Even If You’re Not a Big Enterprise Cyber threats don’t discriminate by company size. Whether you’re a...
Sep 33 min read


Celebrating 8 Years of Client-Centric Cyber Security at ICA Consultancy
As ICA Consultancy marks 8 years of delivering client-centric cyber security services, we’re proud to reflect on a year of growth, innovation, and lasting partnerships. Over the past 12 months, we’ve continued to strengthen our position as a trusted advisor in cyber security and data protection, supporting organisations across financial services, legal, private equity, healthcare, education, and beyond.
Sep 22 min read


Unlocking Strategic Growth through Managed Security Awareness (Culture360°)
Learn how Managed Security Awareness can help you improve your security culture, free up your resources and support your strategic growth
Aug 183 min read


Why Crisis Simulations Matter: Preparing for Security Incidents
Cyber incidents like ransomware and data breaches can disrupt any business. Preparation isn’t just about technology, it’s about making...
Aug 63 min read


Security Risk Management Terminology
Security risk management is more than a compliance activity. It’s the foundation for protecting your organisation from disruption and...
Jul 284 min read


Third-Party Security Risk Management
Third-party risk is a strategic business issue. Organisations are becoming increasingly dependent on external partners, vendors, and...
Jul 183 min read


Securing Your Startup: Simple Steps to Build Strong Cyber Foundations
Cyber security is often seen as a problem for large enterprises. But for startups and scale-ups, the risks are just as real, and the impact of an attack can be devastating. Investors and customers expect robust protection, even from small teams. The good news: you don’t need a huge budget to make a real difference.
Jul 75 min read


Artificial Intelligence: Security, Privacy and Resilience Risks
Organisations are embracing Artificial Intelligence (AI) to drive efficiency and innovation, but as adoption grows, so do the risks.
Jun 284 min read


Post-Quantum Cryptography: Why you need to do something about it now
Let’s face it: mention “quantum” and most people either think of science fiction or switch off entirely; However, quantum computing is moving from theory to reality. While the term “Post-Quantum Cryptography” may sound intimidating, the risks and opportunities, are practical and immediate for anyone responsible for data, privacy, and resilience.
Jun 103 min read


Continuous Control Monitoring: The Key to Efficient Risk Management and Seamless Compliance
Traditional compliance approaches are time-consuming, reactive, and disruptive to business as usual. Enter Continuous Control Monitoring (CCM): a modern, automated approach that transforms compliance and risk management from a box-ticking exercise, often point-in-time, into a real-time strategic advantage.
May 283 min read


The Role of the Fractional CISO: Bridging the Gap in Cyber Security Leadership
In today’s fast-evolving threat and regulatory landscape, the Fractional CISO is a solid choice for many organisations
Mar 256 min read


Unlocking Your Cyber Security Potential: The Power of Maturity Assessments
Understanding where your organisation stands in terms of cyber security is not just important — it’s essential. A Cyber Security Maturity...
Mar 243 min read


Ben de la Salle Recognised in 2&20's Top 100 List for the Fourth Year
Ben de la Salle, CEO & founder, recognised in 2&20's prestigious list of Top 100 Most Influential People 2025
Mar 51 min read


Twelve Frauds of Christmas
Staying vigilant and informed will help you enjoy a safe and joyous festive period. Have a very Merry Christmas and a Happy New Year
Dec 10, 20246 min read


Personal Cyber Security Checklist
It is Cyber Security Awareness Month, and the October 30th is National Checklist Day! Download our FREE Personal Cyber Security Checklist
Oct 28, 20241 min read


Clean Your Virtual Desktop Day
National Clean Your Virtual Desktop Day is an opportunity to declutter your computer's desktop, and improve productivity
Oct 21, 20242 min read


Cyber Security and Sustainability
Improper management of E-Waste can lead to data breaches, significant impacts on our environment, and, potentially, regulatory fines
Oct 14, 20242 min read


Cyber Security and Mental Health
Cyber Security and Mental Health is closely linked. Cyber security is demanding and fast-paced, with constant threats and challenges.
Oct 7, 20243 min read


Welcome to Cyber Security Awareness Month
Today marks the start of Cyber Security Awareness Month, a month dedicated to helping individuals understand more about the risks they face.
Oct 1, 20242 min read


Cyber Awareness Month
Wondering what to do for Cyber Awareness Month? OR no idea what or when Cyber Awareness Month is?
Then download our FREE Guide
Sep 12, 20241 min read


Charting Your Course: A Guide to Planning Your Cyber Security Program
In today's hyperconnected world, having an effective cyber security program is not optional - it is essential. Cyber security breaches...
Jun 13, 20243 min read


CIS: What is "Reasonable Security"
The Center for Internet Security (CIS) has published its view on what "Reasonable Security" means.
May 29, 20243 min read


Be Cyber Self-Aware: Benefits of a Cyber Security Posture Review
A Cyber Security Posture Review (CSPR) acts as a security health check for your organisation, analysing your current security maturity
May 21, 20243 min read
bottom of page