Skip to main content
Mike Pemberton
Written byMike Pemberton
Technology Consulting, Business Consulting, Business Resilience, Project Management
Nov 2022

Is your business prepared for a blackout?

Since the talk of potential power outages and blackouts started, rumours and scaremongering abound - some have even taken to stockpiling should electricity supplies be cut.

Picture of Scott
Written byScott McNab
Cyber Resilience, Cyber Security Strategy, Cyber Essentials and ISO 27001
Oct 2022

Sport and cyber security

How can these things possibly be linked? A Sunday league kickabout, summer cricket tournaments and community netball matches aren’t strong candidates for a cyber threat, right? Wrong.

Michael Waghorn Headshot
Written byMichael Waghorn
Cyber Resilience, Cyber Security Strategy
Oct 2022

10 steps to achieving business continuity

According to ISO 22301, business continuity is defined as: ‘the capability of the organisation to continue delivery of products or services at acceptable predefined levels following disruptive…

Shashank Headshot
Written byShashank Patwardhan
Bespoke Software, Software Delivery & Consultancy, Cyber Resilience
Oct 2022

Five key parts of the (secure) cycle of life

Secure SDLC is defined as the process of integrating security throughout the software development lifecycle, helping you catch issues in requirements before they manifest as security problems in…

Sean Brown Headshot
Written bySean-Francis Brown
Cyber Resilience, Cyber Security Strategy
Oct 2022

Exercise your cyber security

Cyberattacks have continued to rise on three fronts; the number of attacks orchestrated, the level of sophistication demonstrated, and the impact inflicted.

picture of Max Muir
Written byMax Muir
Cyber Resilience, Cyber Security Strategy, Business Resilience
Oct 2022

Cyber Security for Critical National Infrastructure

Recent high-profile attacks on critical national infrastructure (CNI), such as Colonial Pipeline in 2020 and the Irish National Health Service in 2021, have underscored the serious threats posed…

Craig Archdeacon
Written byCraig Archdeacon
Cyber Resilience
Oct 2022

Hacking for protection

Penetration testing is a process in which an organisation’s cyber security is put to the test by ethical hackers.

Simon Evans Headshot
Written bySimon Evans
Cyber Essentials and ISO 27001
Oct 2022

ISO27001 – worth it, or a pain in the annex?

Information security, cyber security and privacy protection remain high on the strategic agenda for most companies. ISO 27001 is changing.  We find out how the new standard can help protect your…