Today, cyber threats have become more sophisticated and complex to identify. Many industries suffer from data breaches. Healthcare is the leader as it has much information of high...
6 June 2025
Cybersecurity is everyone’s responsibility, not just the IT department’s. But getting employees to care about it isn’t always the easiest. Training sessions typically feel like a...
6 June 2025
The UK’s Legal Aid Agency (LAA), overseen by the Ministry of Justice, has fallen victim to a major cyber attack. Many are estimating that this is one of the most significant...
20 May 2025
One of the most influential Cryptocurrency platforms in the world, Coinbase, is the latest victim of a headline-making cyber attack. While there have been other crypto-related...
16 May 2025
UK Retailers are experiencing the full wrath of cyber crime to the greatest degree. It started with Marks and Spencer on the Easter Weekend. Customers were left high and dry...
15 May 2025
Easter weekend didn’t go as planned for Marks & Spencer - one of the UK's favourite retailers for clothes, food and more. The industry giant fell victim to a cyber attack that...
15 May 2025
The finance sector is quite susceptible to cyber attacks since the security of digital financial assets makes it so. Cybercriminals with continually changing attack techniques...
12 May 2025
The surge in remote work didn't just rewrite the rules of collaboration; it unlocked doors that many organisations didn’t even know existed. Conversations that once occurred...
9 May 2025
Your primary priority when running a Minecraft server should be security. As online worlds have grown in popularity, hackers and griefers have turned their attention to Minecraft...
12 April 2025
Businesses face growing threats from fraud and data breaches. Traditional manual processes increase risks, but modern tools help protect sensitive information. Automated accounts...
11 April 2025
Modern businesses rely heavily on seamless communication and efficient workflows. Employee extensions, whether for phone systems, software applications, or browser...
3 April 2025
In late January 2025, the Chinese AI platform DeepSeek – a rapidly rising competitor in the AI chatbot space – suffered a major cyber attack that exposed sensitive data and...
25 March 2025
Businesses in Sydney rely heavily on their online presence to attract customers, build credibility, and drive revenue. However, the success of a website goes beyond aesthetics and...
19 March 2025
Large enterprises have been relying on mainframe computer system for over 50 years. Although newer computing architectures such as cloud and distributed systems have come to...
18 March 2025
Even though the famous Google product is the most used browser in the world, it is also a frequent target of cyber attacks. Since IT administrators are tasked with managing...
4 March 2025
Nowadays, cybersecurity is something everyone needs to be aware of and vigilant about. This is particularly true for college students, and is not simply a problem for IT teams in...
3 March 2025
While firewalls, encryption, and other tech defences bolster an organisation's cybersecurity, many data breaches still originate from an unexpected source: human mistakes. Whether...
3 March 2025
Data security has become necessary due to our increasing dependence on mobile applications for everything, including social networking and banking. Cybercriminals are constantly...
3 March 2025
Cybercrime is on the rise, and global damages are projected to increase to $15.63 trillion by 2029. Organisations experiencing a rise in cyber attacks are seeking effective but...
28 February 2025
As software as a service (SaaS) solutions become increasingly popular, it is crucial to securely incorporate them into an organisation’s cybersecurity framework. Of course, SaaS...
27 February 2025
The integration of artificial intelligence (AI) changes the in-depth financial sector. AI changes how financial institutions operate and helps them improve efficiency, security,...
26 February 2025
Cybersecurity isn't just an IT concern; it's a fundamental aspect of digital marketing. As marketers, we handle vast amounts of data, from customer information to campaign...
26 February 2025
The vast and complex field of cybersecurity is full of threats and risks that every business owner or senior business executive must be aware of. Protecting the personal...
30 November 2021
Ransomware tabletop exercises are one of the best ways to ensure your organisation is prepared to respond to ransomware attacks. Properly planned and conducted ransomware...
26 November 2021
Ransomware tabletop exercises enable you to test whether your business is equipped to deal with a ransomware attack and mitigate its impact. If you want to know why this is...
25 November 2021
Challenges of the cybersecurity industry are as dynamic as the field itself. The cybersecurity landscape is ever-changing as new technologies emerge and transform businesses'...
23 September 2021
Cyber-attacks are more rampant today than ever before. Attacks like the SolarWinds hack prove that even the biggest and strongest organisations in terms of cyber security measures...
12 May 2021
Cybersecurity is a huge concern for small to medium businesses. Cybersecurity threats have amplified in 2021 since the advent of the COVID-19 pandemic and the ensuing ‘Work from...
11 May 2021
WordPress, one of the most popular platforms for creating websites, has been targeted due to a security vulnerability that hackers discovered in a common plugin used with the...
6 May 2021
Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity. If harnessed correctly, Artificial Intelligence or AI systems can be...
4 May 2021
What exactly is cybersecurity and why does cyber security matter to every person and company? We start by providing an easy to read answer in this blog, the first on many on this...
30 April 2021
Given the complex cybersecurity challenges created by the Covid-19 pandemic, it has become imperative for organisations to regularly test their cyber resilience, security...
27 April 2021
Like many industries, the supply chain sector is in the midst of a digital transformation — from automation of tasks to the Internet of Things streamlining operations. However,...
22 April 2021
Aster Housing regularly conducts annual cybersecurity audits. However, this time around, it chose to host a Cyber Crisis Tabletop Exercise (CCTE) with Cyber Management Alliance...
20 April 2021
Cyber tabletop exercises are the flavour of the season in the world of IT security. The COVID-19 pandemic has exposed vulnerabilities in the security infrastructure of businesses...
15 April 2021
The Monetary Authority of Singapore has recently released revised Technology Risk Management (TRM) guidelines to combat the growing threat of cyber risk in the financial sector....
13 April 2021
To ensure that your business is safe at all times and your crown jewels are protected against malicious activities, you need to have a solid cyber incident response plan and you...
8 September 2020
You can never be too prepared when it comes to cybersecurity and data privacy. For the health of your business, it is essential to continuously test your cyber incident response...
15 June 2020
We reviewed SAMA, QCB & NESA Regulations on Business Continuity Planning, Testing & Cyber crisis tabletop exercises and created an easy reference for you. We will be updating this...
24 May 2020
One often tends to get entangled in the word ‘tabletop’ when one thinks of conducting a cyber tabletop exercise for their organisation. It is natural to think of this exercise as...
8 May 2020
We are often asked about the benefits of internal cyber incident response training over our public or online training. This blog talks of the advantages of running an internal...
7 May 2020
In this blog, I share why our clients who do ISO 27001 audits are including cyber attack tabletop exercises audits in their audit schedules.
6 May 2020
If you’re one of those smart business executives who knows how important a cybersecurity tabletop exercise for their organisation is, you’ve won half the battle! The other half in...
2 May 2020
Cyber table top exercises are on the radar for all businesses that understand the importance of cybersecurity today. Find out what makes a normal cyber response test a really good...
21 April 2020
Cyber Table Top Exercises help you test and evaluate the efficacy of your well-laid plans in a real-world situation. You have to ask yourself, when your organisation is under a...
27 March 2020