June 2016

Shutting the Door on the Attacker

There's no such thing as infallible security, and preventing every single security breach is impossible.

But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team's first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.

What is Cyber Essentials?

In 2012, HM Government launched the 10 Steps to Cyber Security in an effort to make clear that risks to information should be taken as seriously as financial, regulatory, legal or operational risk. The 10 steps to Cyber Security programme provided guidance on how an organisation might approach the task of making security an integral part of their business.