Finding the right career path is similar to starting a business. If you can identify where your personal interests and market demand meet, you’re onto a winner. Technology is now a pivotal factor for business across the globe. As a result, cyber security has become an in-demand skillset to keep these companies operating. In fact, […]
Technology makes health and social care easier for everyone involved. Care centres and other organisations can monitor, record, analyse, share, and action findings quickly from anywhere in the world. As a result, collecting personal data has become commonplace, with 80% of health, social work and social care organisations holding personal data, according to a government […]
Since opening a new office in Aberdeen, we’ve been exploring cyber security advancements in the Oil & Gas Industry. A key contributor is the adoption of new IoT infrastructures, leading to the industry seeing one of the most significant digital transformations in modern history. It makes sense. Introducing new data points and creating greater connectivity […]
Forget mass-spam emails. A spear phishing attack is a targeted approach to accessing an individual via email. Hackers will research and find information others wouldn’t know about a high-worth individual. This data might come from social media or search engines. They’ll then use the data to create intriguing emails harboring a disguised virus download or […]
“This app needs access to your: contacts, photos, microphone, Deliveroo history, and mother’s texts.” “…” Managing app permissions is a common, confusing, and often fury inducing activity. After all, if the app claims it won’t work without these permissions, what are you to do? App permissions management relates to defining an app’s access to your […]
Red teaming, in short, involves a team of security experts simulating an extended attack on an entire organisation to identify and test potential weaknesses. Red teaming is the cyber security equivalent to: “The best defence is a good offence”. The attacking team uses strategic teamwork to exploit physical, hardware, software, and human vulnerabilities across an […]
You’re here because you want to know the difference between a vulnerability assessment and penetration testing. Well, we’re here to tell you the question isn’t which one to use. The question is which one you should use first. But let’s back up for a second and understand why we do these scans and tests in […]
Businesses often believe sharing login details, emails, passwords, and user accounts can save time and money. But these perceptions ignore essential information. When you understand the risk of account sharing, you see what you save in money; you risk losing in an attack. What you save in time, you risk doubling in human error. And […]
After 4 years, the Open Web Application Security Project Top 10 document has been updated to account for the latest and most critical cyber security risks. What is OWASP Top 10? The OWASP (Open Web Application Security Project) Top Ten is an internationally recognised methodology for pen testers and web developers to use when testing […]
The board of CyberCrowd is delighted to be working with Tech industry leader Matt Franklin, who this month joins them to help steer the company’s business strategy. Chief Executive Officer at IT solution and managed services provider; Roc Technologies, Franklin will be taking on a non-Executive Directorship of the rapidly expanding, Newbury based cyber security […]