API Penetration Testing Checklist

API security is an undervalued but crucial aspect of information security. Some of the most common cyber attacks exploit APIs and web applications, and if organisations are to stay secure, they must test their systems to identify and eradicate weaknesses. Organisations can achieve this with API penetration tests. An ethical hacker (or ‘penetration tester’) will … Read more

API Penetration Testing Checklist

API security is an undervalued but crucial aspect of information security. Some of the most common cyber attacks exploit APIs and web applications, and if organisations are to stay secure, they must test their systems to identify and eradicate weaknesses. Organisations can achieve this with API penetration tests. An ethical hacker (or ‘penetration tester’) will … Read more

Catches of the Month: Phishing Scams for February 2023

Welcome to our February 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at a UK government warning about a resurgence in Russian cyber attacks and concerns that the much-discussed AI programme ChatGPT … Read more

Catches of the Month: Phishing Scams for February 2023

Welcome to our February 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at a UK government warning about a resurgence in Russian cyber attacks and concerns that the much-discussed AI programme ChatGPT … Read more

How to Investigate a Cyber Incident: 5-Step Guide

Cyber incident investigation is one of the most crucial skills that an organisation can master. With countless information security threats looming over your business, you need to understand that data breaches are inevitable. When you come to this realisation, you can implement an incident response plan that helps you identify and investigate security threats. This … Read more

How to Investigate a Cyber Incident: 5-Step Guide

Cyber incident investigation is one of the most crucial skills that an organisation can master. With countless information security threats looming over your business, you need to understand that data breaches are inevitable. When you come to this realisation, you can implement an incident response plan that helps you identify and investigate security threats. This … Read more

How to write a GDPR data protection policy – with template examples

The GDPR (General Data Protection Regulation) isn’t just about implementing technological and organisational measures to protect the information you store. You also need to demonstrate your compliance, which is why data security policies are essential. These documents form part of organisations’ broader commitment to accountability, outlined in Article 5(2) of the GDPR. In this blog, … Read more

How to write a GDPR data protection policy – with template examples

The GDPR (General Data Protection Regulation) isn’t just about implementing technological and organisational measures to protect the information you store. You also need to demonstrate your compliance, which is why data security policies are essential. These documents form part of organisations’ broader commitment to accountability, outlined in Article 5(2) of the GDPR. In this blog, … Read more