News

ISO/IEC 42001:2023: Transforming AI Management

Article by Tony Healy, Chief Operating & Information officer, CyberCrowd. Welcome to the digital age, where artificial intelligence (AI) is not just a technological advancement but a pivotal element in organisational strategy. With the introduction of ISO/IEC 42001:2023, we step into a new era of AI management. This standard, the first globally, provides comprehensive guidelines […]

Social Engineering Threat Intelligence

Safeguarding Your Corporate Heart Against Cyber Threats

In the realm of digital commerce and corporate engagement, the approach of Valentine’s Day underscores not only opportunities for customer engagement but also substantial cybersecurity vulnerabilities. As businesses gear up for seasonal promotions and interactions with clients, it’s paramount to adopt a proactive stance against cyber threats that may exploit this occasion for malicious purposes. […]

Managed Detection & Response

Elevating Security Posture – The Power of Out-of-Hours Managed SOC Services

In the rapidly evolving landscape of cyber threats, organisations must constantly adapt to protect sensitive data and critical assets. A robust security posture is essential, and achieving this requires a strategic and proactive approach to Security Operations (SecOps). Many businesses maintain in-house security teams and monitoring capabilities, but challenges often arise, especially during non-standard working […]

News

The Rising Threat of QR Code Scams: Staying Vigilant

At present, QR codes have become an integral part of our daily lives, simplifying tasks from mobile payments to accessing information with a quick scan. However, the convenience they offer has also attracted the attention of cybercriminals, leading to a significant surge in QR code scams, with a staggering 500% increase since the onset of […]

Managed Detection & Response

Strengthening Your Cyber Defences: The Importance of Incident Response Tabletop Exercises

In today’s hyper-connected digital landscape, the threat of cyberattacks looms large, making it imperative for organisations to fortify their defences against potential security breaches. One crucial component of a robust cybersecurity strategy is the Incident Response Tabletop Exercise, a simulated scenario designed to test an organisation’s response plan to security incidents. In this blog post, […]

Threat Intelligence

Ransomware Continues to Threaten the UK: Protecting your Organisation in an Evolving Landscape

Ransomware remains a persistent and pervasive threat in the cybersecurity landscape, consistently making headlines and posing a significant risk to organisations of all sizes. In the UK, as in many other parts of the world, attackers are increasingly employing sophisticated techniques to compromise systems and, in some cases, outsmart existing defences.  This article explores the […]

Social Engineering

9 Ways To Safeguard Against Phishing Attacks

In our recent exploration of Social Engineering Attacks, we highlighted the pervasive threat of phishing attacks, which continue to be a major cybersecurity concern for organisations globally. As one of the most prevalent forms of cybercrime, phishing attacks compromise sensitive data, leading to severe consequences for both individuals and businesses. Understanding the nuances of phishing […]

News

CyberCrowd named as an Assured Service Provider on the NCSC Cyber Incident Exercising Scheme

CyberCrowd, an independent cyber security information and services provider, has been listed as one of the first Assured Service Providers on the exciting new National Cyber Security (NCSC) Cyber Incident Exercising (CIE) scheme. Evaluated and onboarded by the NCSC’s delivery partner, IASME, CyberCrowd has met the NCSC’s rigorous standards for high quality cyber incident exercising, […]

Social Engineering

Defending Against Social Engineering Attacks: A Comprehensive Guide

In the relentless cyber threat landscape, one of the most potent weapons in a hacker’s arsenal is social engineering. It is an insidious approach that exploits human psychology to manipulate individuals into divulging sensitive information or performing actions that may compromise security. Real-World Example: The Target Data Breach In 2013, retail giant Target fell victim […]

  • 1
  • 2