Our stories

woman looking at cave paintings - archaeology and cyber attacker analogy

Hidden treasure: archaeology and cyber attacks

Archaeology isn’t much like the Indiana Jones movies; it’s much less dangerous and requires a lot more patience and attention to detail. But it is about finding ‘hidden’ treasure, even if that treasure is a shard of broken pottery, discarded shells and bones, or an arrowhead. That treasure may not be valuable in itself, but it might reveal new information ...

Auto-generated content is not all rainbows and unicorns

About 15 years ago – pre-history, in social media terms - there was a phase during which various brands experimented with auto-generated content on their social media channels and invited the public to participate. The idea was that people would submit text which would be automatically converted into a social media post published on the brand page. The brands no ...

Want an Early Warning? Don’t mind if I do

Is your organisation based in the UK, but not signed up to the National Cyber Security Centre’s (NCSC) Early Warning system yet–and if not, why not? The Early Warning system is designed to identify cyber attacks on UK businesses before they are executed, and then to let that business know. This early warning means that the targeted organisation can work ...
checklist

Is there a problem with checklists?

People can be quite snooty about checklists. Perhaps they see them as for beginners. Perhaps they see the items on the checklist as being obvious and therefore that the list is unnecessary. Or perhaps their concern is that by having the support of the checklist, people don’t think beyond what’s on the list. Checklists are not only for beginners Checklists ...

New tools – and not just for Boards

The NCSC recently refreshed their Board Toolkit, and while they’ve intended it for reasonably large organisations, there’s a lot in there that smaller organisations will find useful as well. You don't need to be a member of a Board to get value from it. For example, they’ve provided an introduction to cyber security, which includes short videos on topics such ...

Breaking the rules: security exceptions

Your written security policies for your business were created at a particular point in time, for a particular set of circumstances. But circumstances change: this is why a regular review of your security policies is a good idea, to check that they are still appropriate. So: circumstances changed. Now you need to do something (X) for business reasons, but the ...