Our stories

See it, Say it, Sorted

See it, Say it, Sorted has become embedded in the UK culture—at least, for anyone who has been on a train in the last few years. Although it is an uncomfortable phrase (something about the change from instruction to promise, and the not-quite-rhyme), it is easy to remember, and effective. Apparently, since the campaign started in 2016, the number of ...
pink neon sign saying exit

Can yesterday’s visitor get access today?

How are electronic guest passes to your workplace configured? This morning, one of our colleagues could get into a building (and into various rooms in that building) using yesterday’s guest pass—because they'd been given access less than 24 hours earlier. Once the 24-hour time limit was met, the pass no longer worked. There are potential security issues here. Another person ...
Cork board with pins and notes, one saying 'whodunnit?'

Whodunnit?

Recently, the Click and Protect team took part in one of the regular CSP Whodunnit events. These are intended to be entertaining evening events, but also to raise cyber security awareness. The idea is that the team role-play various characters (some of which may be suspects) in a cyber-crime. Attendees must collate clues and work out who is guilty of ...

Looking for a security manager?

Let’s suppose you’ve decided you need to hire someone to manage your cyber security for you. Perhaps you don’t need to hire a full time employee (hint: you could use our security manager as a service, for however many hours a week you need), but you do need someone. Let’s also suppose you have no security personnel in place at ...

Are you still secure? Time to check

When was the last time that you checked that your security measures were working? Security measures vary a lot in complexity and technical requirements. You might need to check that no-one can sneak in to your business through an open and unguarded back door. Or you might need to organise a team of penetration testers to test your online applications ...

Security for your essential business applications

People often think that everything they do ‘in the cloud’ is protected by that cloud service provider. It's easy to assume that therefore your information is safe. This isn’t always the case—it depends on what you’ve paid for, and how you’ve set up your cloud services. Probably, your activity in the cloud is through using applications such as email, Slack, ...