Cybersecurity Blog

We've compiled a list of the cyber-attacks, data breaches and ransomware attacks that made news in September 2022. This list has been created for purely educational purposes, to...
30 September 2022
When it comes to safeguarding your company's data, you need a foolproof game plan. That should include everything from encrypting confidential files to securing a VPN for all...
27 September 2022
A new data breach or cyber attack is reported almost every single week nowadays. Take a look at this exhaustive list of cyber-attacks in August 2022, for example.  There is really...
23 September 2022
Uber needs no introduction so we’ll skip that part and jump right into the big news - apparently it’s been compromised by an 18-year old hacker!  As per media stories and numerous...
18 September 2022
Cyber Management Alliance, the global frontrunner in Cybersecurity Consultancy and Training, was recently invited to participate in one of the most significant European events for...
14 September 2022
Do you know what connects CISCO, Colonial Pipeline, SolarWinds, Marriott and Nvidia? Apart from the fact that they’re all giants of their industries, they are also all recent...
2 September 2022
Here’s a list of some of the cyber-attacks, data breaches and ransomware attacks that occurred across the world in August 2022. With this list, our attempt has been to capture all...
1 September 2022
Is it possible to be sure and show proof of the fact that your business is really secure?  Are you relying mostly on hope and wishing that you’re not the next victim of a ravaging...
30 August 2022
Browser ‘Cookies’ are a very important tool on the internet today. Their emergence dates back to 1994 and discussions around Cookie Consent are more than a decade old now....
26 August 2022
Programming languages are sets of rules and keywords that provide instructions for computers to execute. Software programming and coding are essential skills in the technology...
22 August 2022
Businesses today face many, complicated risks - from cyberattacks to supply chain complications. Several unforeseen events can disrupt operations and cost millions to resolve. ...
17 August 2022
It is safe to say that cybersecurity for students is a topic that will be gaining more and more attention with every passing year now. With modern technology constantly...
14 August 2022
When you are developing any new software, the chances of committing small mistakes despite your best efforts are quite high. And this in turn can make your software vulnerable to...
8 August 2022
A few decades ago, an organisation’s most valuable asset was either the real estate or the capital it owned. But today, data is the new gold. Likewise, the most valuable asset of...
6 August 2022
It’s no secret that cybersecurity is a major concern today for everyone - businesses, governments and individuals. But there is a particular group of individuals that is...
4 August 2022
Northern Ireland Cyber Security Centre recently selected Cyber Management Alliance to conduct its flagship NCSC-Certified Cyber Incident Planning & Response (CIPR) training  for...
4 August 2022
The education and research sector suffered a 75% increase in cyberattacks in 2021 over 2020 as per some studies. While we tend to think of cyber-attacks as something that only...
3 August 2022
SOCs or Security Operations Centres have become essential to modern-day cybersecurity. A SOC is a 24X7 operation that gives you access to people and technologies capable of...
2 August 2022
Even the best of websites have security vulnerabilities. This fact needs little corroboration because if it weren’t true sensitive data and customer information of some of the...
29 July 2022
Students and young people are perhaps some of the most advanced when it comes to using technology and leveraging it to do great, creative things. Yet, it is them who often tend to...
28 July 2022
The rise and evolution of technology has had many indisputable advantages for individuals and businesses. However, it has also had one serious drawback - the rise in cybercrime,...
27 July 2022
Cyber Management Alliance's flagship Wisdom of Crowds events are unlike any other cybersecurity events across the globe. They are unscripted and spontaneous, yet at the same time,...
15 July 2022
Would you ever recruit a cyber criminal in your security team?  This was the dichotomous question that executives participating in the recent Wisdom of Crowds event in London had...
14 July 2022
While technological disruptions and digitisation are a boon to society, the scale and sophistication of cyberattacks is rising and will only continue to surge over the coming...
7 July 2022
Ransomware-As-A-Service is a business model in which malware is developed by criminals for use by criminals. It is very similar to traditional software-as-a-service models. The...
6 July 2022
Cyber Management Alliance’s Wisdom of Crowds events have come to be a hallmark of the collaborative spirit of the cybersecurity industry. The first, post-pandemic Wisdom of Crowds...
5 July 2022
In the modern business context, Ransomware Attacks enjoy a particularly peculiar position amongst all other organisational challenges.  They’re extremely damaging and absolutely...
30 June 2022
The digitisation of the film and media industry has brought fantastic benefits to its stakeholders, allowing filmmakers and artists to save millions of US dollars and simplify...
16 June 2022
The ransomware landscape continues to grow and become more complex with each successive year and 2022 has been no exception. As we come to the close of the first half of the year,...
15 June 2022
 Cyber security threats to both businesses and individuals are increasing daily. The good part is that consumers too are increasingly become aware of the amount of personal data...
7 June 2022
The digital transformation of businesses around the world has accelerated significantly in recent years. With the spread of digitalization, there is a very high increase in the...
3 June 2022
For every business, organisation or government body, having a website is almost mandatory today. The only thing that’s worse than not having one, is having a website that’s not...
2 June 2022
We live in the age of technology, and most of us are constantly connected to the internet. In fact, the majority of companies (and individuals) couldn’t function without...
1 June 2022
Certified Information Systems Auditor or CISA is one of the most sought-after certification programs in the world for IT and auditing professionals.  CISA refers to a...
26 May 2022
Look, we get it. You don’t want to pay for a VPN. After all, who wants to add another subscription to the growing list of monthly payments? Nowadays, everything's bundled as a...
24 May 2022
Accenture, Acer, Colonial Pipeline, JBS Foods. What do these names have in common? Yes, they might be some of the most successful companies and organisations in the world but...
19 May 2022
Cybersecurity has been an important topic of conversation and discussion in the corporate and government sectors for a while now. However, professionals and participants in other...
18 May 2022
Being fully prepared to totally prevent a ransomware attack may be akin to a modern-day cybersecurity fairytale. Even with the best technology investments and human resources to...
17 May 2022
What is Cyber Security and what is its importance for your business? What is the importance of Cyber Security Awareness and does Cyber Security Consultancy really help in all of...
3 May 2022
Ransomware Attacks have been occupying considerable headline space in the last few years. This should come as no surprise given how rampant, complex and expensive these attacks...
29 April 2022
Cyber Security Awareness amongst employees has emerged as one of the primary concerns that a business must focus on in the modern, digital age. Imparting basic skills needed for...
27 April 2022
The National Institute of Standards and Technology, popularly known as NIST, details its recommendations on Cybersecurity Incident Management and Response in the ‘Computer...
26 April 2022
What is a Virtual CISO? What is their job description and why does your business need one?  The increasing risk of cyber-attacks coupled with compliance obligations has meant that...
21 April 2022
The COVID-19 pandemic changed our world and the way businesses operate dramatically. It has also brought about a diametrical change in the way education is delivered and accessed....
5 April 2022
The online presence of any business and its cybersecurity have become critical factors for success during the pandemic. Almost all major companies worldwide decided to switch to...
1 April 2022
Blockchain has been a buzzword for the past few years and it’s really no surprise given how it’s changing the dynamic of many industries. Blockchain technology is expected to...
21 March 2022
Phishing is one of the most persistent cyber threats facing businesses and consumers. These scams are virtually as old as email itself, but they’ve remained effective despite...
17 March 2022
Cyber Management Alliance will be delivering eight events in cybersecurity training for minority-owned businesses in the Midlands region supported by Department for Digital,...
9 March 2022
Global spending on cloud services is expected to rise to $482 billion in 2022, up from $313 billion in 2020. And by 2028, the market will be worth well over $1,250 billion. As...
24 February 2022
Spyware is a scary, unknown, mysterious part of the internet. Spyware is a heavily used malicious tactic that puts your privacy and data safety at risk. However, like all things...
23 February 2022

Free Cyber Incident Response Plan Template

Optimised Document Structure, Easy to understand guidance on Cyber Incident Planning & Response and a ZERO-FLUFF approach makes this cyber response plan template immediately useful.

Simply fill in your details in the form below to receive your copy and more free mind maps and checklists.