
Data Protection Officer Questions – Answered by a DPO
There are many questions about why a Data Protection Officer (DPO) is needed and what [...]
Hackers Take Use of Popular Twitter Accounts to Con Users
Users of twitter have been scammed by attackers who took control of well-known people such [...]
Can I get Cyber Essentials Plus Certification Remotely?
Many organisations have sought to achieve Cyber Essentials Plus (CE+) certification remotely (as opposed to [...]
SAP NetWeaver Contains Remotely Executable Code
Over 40,000 SAP customers need to update to the latest version to mitigate risk from [...]
Should I Be Worried About Mobile Phone Hacking?
“But my phone cannot be hacked!” Phrases like this are far too common and can [...]
Critical RCE Vulnerability in F5 BIG-IP Application Security Servers
This vulnerability gives the CVSS score of 10/10, meaning it could result in unpatched users [...]
Guacamole Open Source Remote Administrative Protocol Session Hijacking
Two CVE’s (2020-9497 and 2020-9498) have been announced in the Apache Guacamole service. Successful exploitation [...]
How to Maintain ISO 27001 Remotely
In this new business era of virtual working, I have been asked how to maintain [...]
Cyber Essentials Plus – Your Burning Questions Answered
In our recent webinar, Achieving Cyber Essentials Plus, Nick Roberts and Taras Sachok provided valuable [...]