Skip to main content
Simon Holroyd
Written bySimon Holroyd
Cyber Resilience

Get Breach Ready - Minimise the impact of a successful cyber attack

The main topic of conversation around cybersecurity often focuses on preventing data breaches, but what we forget is the processes needed to minimise their impact. Even with staff training and…

Chris Anderson
Written byChris Anderson
Data & Analytics, Data Protection and GDPR, Technology Consulting

Immutable backup storage - the last line of defence

We all know that using an air gap within a backup solution to put space between you and cyber criminals is vital, but with discussion around the security – or lack thereof - of data more prevalent…

Stewart Hogg
Written byStewart Hogg
Cyber Essentials and ISO 27001, Cyber Resilience, Cyber Security Strategy, Software Delivery & Consultancy

Life’s a breach – saying goodbye to cyberattacks

Life's a Breach was an exciting event we hosted in association with ALARM.

Luke Headshot
Written byLuke Kirby
Bespoke Software, Software Delivery & Consultancy, Software Operations & Support

How DORA capabilities are shaping software delivery

As a bespoke software developer, you really only have one goal: deliver high-quality software that meets the needs, and exceeds the expectations, of your clients

Christopher Grosberg
Written byChristopher Grosberg

Couch to 365 | Gathering Intel

This is part of the Couch to 365 series, developed by Waterstons. If you haven’t already, sign up now for free at Couchto365.com.

Katie Headshot
Written byKatie Fallon

Knock Knock: Opening the door to service design

How can you be sure that the person at your door is really from British Gas? Or the IT engineer is really from Waterstons? How can an app help answer those questions? Innovation Consultant Katie…

Neil Headshot
Written byNeil Robertson
Cyber Essentials and ISO 27001, Cyber Resilience, Cyber Security Strategy

Cybercrime doesn't stand still - know how and when to act

As technology, systems and software become more sophisticated, so do the threat actors and their methods for infiltration.

Helen headshot
Written byHelen Hopwood-Curry
Cyber Security Strategy, Cyber Resilience, Cyber Essentials and ISO 27001

Gone phishing

Even cyber attackers have new year's resolutions...