Cybersecurity Blog

The New Year has started and the cyber criminals are back with a bang. January 2023 has presented us with an exhaustive list of cyber-attacks, ransomware attacks and data breaches...
1 February 2023
As technology continues to become increasingly integrated into our daily lives, the threat of cyber attacks and ransomware attacks has become more prevalent than ever. A cyber...
25 January 2023
  In a recent study, 84% of respondents indicated their concern over how their data is collected, and about privacy measures taken for their data security. They also voiced the...
25 January 2023
Cryptocurrencies have altered the way financial transactions work across the world and the way people invest their money too. A large number of people have transacted on a crypto...
13 January 2023
Did you know that in 2022 more than 10 TB of data was stolen every month in ransomware attacks as per some reports? As per some other estimates, almost $111,737,688.23 have been...
10 January 2023
Ending the year with a bang has a very different connotation in the world of cybersecurity. Here is a roundup of all the cyber-attacks, data breaches, ransomware attacks in...
2 January 2023
The fact that social media usage for professional networking is growing at an exponential rate is something almost everyone is aware of. Businesses across the world use social...
29 December 2022
The modern citizen in most countries around the world has access to the near unlimited source of useful and applicable public information - the internet. As useful and...
9 December 2022
The year may be ending but the cyber attacks certainly aren't. November 2022 was full of high-profile data breaches, attacks on cryptocurrency exchanges, government bodies and...
1 December 2022
Cyber Security Tabletop Exercises have become indispensable for future-focussed, cyber resilient businesses. Given the massive spike in sophisticated cybersecurity attacks in 2022...
22 November 2022
Ransomware is a type of malware which restricts users from accessing their own data. Hackers use ransomware to encrypt your data and lock you out of your own systems. They then...
14 November 2022
You’ve probably heard quite a bit about the Cyber Essentials scheme and what it means to have the Cyber Essentials Certification for your business.
3 November 2022
We've reached the tail end of the year but the cyber-attacks aren't ending. Here's a list of the cyber attacks, data breaches and ransomware attacks that made the headlines in...
1 November 2022
As the world goes increasingly digital and reliant on cloud storage, data security has become more critical in recent years. You need it not only to keep your data safe from...
27 October 2022
Data is the new gold. Every business out there is looking for precious customer data on which to base their marketing endeavours, engineer new products and target the correct...
26 October 2022
The Internet of Things (IoT) is the networking of objects. It's comparable to a social network or email provider, but IoT links devices rather than people. According to Ericsson,...
25 October 2022
The importance of cybersecurity is no secret. In today's world, data breaches and cyber-attacks are becoming more and more common. And as our reliance on technology grows, so does...
22 October 2022
What are Cyber Attack Tabletop Exercises and why are they so important? What constitutes a Cyber Security Tabletop Exercises scenario? These and other significant cybersecurity...
17 October 2022
Uber Technologies’ former CISO, Joseph Sullivan, has been convicted of federal charges for covering up a 2016 data breach in which the personal information of 57 million Uber...
11 October 2022
We've compiled a list of the cyber-attacks, data breaches and ransomware attacks that made news in September 2022. This list has been created for purely educational purposes, to...
30 September 2022
When it comes to safeguarding your company's data, you need a foolproof game plan. That should include everything from encrypting confidential files to securing a VPN for all...
27 September 2022
A new data breach or cyber attack is reported almost every single week nowadays. Take a look at this exhaustive list of cyber-attacks in August 2022, for example.  There is really...
23 September 2022
Uber needs no introduction so we’ll skip that part and jump right into the big news - apparently it’s been compromised by an 18-year old hacker!  As per media stories and numerous...
18 September 2022
Cyber Management Alliance, the global frontrunner in Cybersecurity Consultancy and Training, was recently invited to participate in one of the most significant European events for...
14 September 2022
Do you know what connects CISCO, Colonial Pipeline, SolarWinds, Marriott and Nvidia? Apart from the fact that they’re all giants of their industries, they are also all recent...
2 September 2022
Here’s a list of some of the cyber-attacks, data breaches and ransomware attacks that occurred across the world in August 2022. With this list, our attempt has been to capture all...
1 September 2022
Is it possible to be sure and show proof of the fact that your business is really secure?  Are you relying mostly on hope and wishing that you’re not the next victim of a ravaging...
30 August 2022
Browser ‘Cookies’ are a very important tool on the internet today. Their emergence dates back to 1994 and discussions around Cookie Consent are more than a decade old now....
26 August 2022
Programming languages are sets of rules and keywords that provide instructions for computers to execute. Software programming and coding are essential skills in the technology...
22 August 2022
Businesses today face many, complicated risks - from cyberattacks to supply chain complications. Several unforeseen events can disrupt operations and cost millions to resolve. ...
17 August 2022
It is safe to say that cybersecurity for students is a topic that will be gaining more and more attention with every passing year now. With modern technology constantly...
14 August 2022
When you are developing any new software, the chances of committing small mistakes despite your best efforts are quite high. And this in turn can make your software vulnerable to...
8 August 2022
A few decades ago, an organisation’s most valuable asset was either the real estate or the capital it owned. But today, data is the new gold. Likewise, the most valuable asset of...
6 August 2022
It’s no secret that cybersecurity is a major concern today for everyone - businesses, governments and individuals. But there is a particular group of individuals that is...
4 August 2022
Northern Ireland Cyber Security Centre recently selected Cyber Management Alliance to conduct its flagship NCSC-Certified Cyber Incident Planning & Response (CIPR) training  for...
4 August 2022
The education and research sector suffered a 75% increase in cyberattacks in 2021 over 2020 as per some studies. While we tend to think of cyber-attacks as something that only...
3 August 2022
SOCs or Security Operations Centres have become essential to modern-day cybersecurity. A SOC is a 24X7 operation that gives you access to people and technologies capable of...
2 August 2022
Even the best of websites have security vulnerabilities. This fact needs little corroboration because if it weren’t true sensitive data and customer information of some of the...
29 July 2022
Students and young people are perhaps some of the most advanced when it comes to using technology and leveraging it to do great, creative things. Yet, it is them who often tend to...
28 July 2022
The rise and evolution of technology has had many indisputable advantages for individuals and businesses. However, it has also had one serious drawback - the rise in cybercrime,...
27 July 2022
Cyber Management Alliance's flagship Wisdom of Crowds events are unlike any other cybersecurity events across the globe. They are unscripted and spontaneous, yet at the same time,...
15 July 2022
Would you ever recruit a cyber criminal in your security team?  This was the dichotomous question that executives participating in the recent Wisdom of Crowds event in London had...
14 July 2022
While technological disruptions and digitisation are a boon to society, the scale and sophistication of cyberattacks is rising and will only continue to surge over the coming...
7 July 2022
Ransomware-As-A-Service is a business model in which malware is developed by criminals for use by criminals. It is very similar to traditional software-as-a-service models. The...
6 July 2022
Cyber Management Alliance’s Wisdom of Crowds events have come to be a hallmark of the collaborative spirit of the cybersecurity industry. The first, post-pandemic Wisdom of Crowds...
5 July 2022
In the modern business context, Ransomware Attacks enjoy a particularly peculiar position amongst all other organisational challenges.  They’re extremely damaging and absolutely...
30 June 2022
The digitisation of the film and media industry has brought fantastic benefits to its stakeholders, allowing filmmakers and artists to save millions of US dollars and simplify...
16 June 2022
The ransomware landscape continues to grow and become more complex with each successive year and 2022 has been no exception. As we come to the close of the first half of the year,...
15 June 2022
 Cyber security threats to both businesses and individuals are increasing daily. The good part is that consumers too are increasingly become aware of the amount of personal data...
7 June 2022
The digital transformation of businesses around the world has accelerated significantly in recent years. With the spread of digitalization, there is a very high increase in the...
3 June 2022
Content not found

Free Cyber Incident Response Plan Template

Optimised Document Structure, Easy to understand guidance on Cyber Incident Planning & Response and a ZERO-FLUFF approach makes this cyber response plan template immediately useful.

Simply fill in your details in the form below to receive your copy and more free mind maps and checklists.