Social Engineering

Defending Against Social Engineering Attacks: A Comprehensive Guide

In the relentless cyber threat landscape, one of the most potent weapons in a hacker’s arsenal is social engineering. It is an insidious approach that exploits human psychology to manipulate individuals into divulging sensitive information or performing actions that may compromise security. Real-World Example: The Target Data Breach In 2013, retail giant Target fell victim […]

Managed Security Threat Intelligence

Unmasking the hidden danger: Insider Threats in Cyber Security

In today’s interconnected digital world, businesses rely heavily on technology to drive innovation, streamline operations, and enhance productivity. While these advancements have undeniably transformed the way we work, they have also given rise to a new and insidious threat – insider threats. Unlike external cyber-attacks, insider threats originate from within an organisation, making them exceptionally […]


CyberCrowd announce new strategic partnership with CSIS

LONDON, ENGLAND – CSIS Security Group A/S (“CSIS”) and CyberCrowd Limited (“CyberCrowd”) have signed a Strategic Partnership, enabling the two companies to join forces and accelerate the execution of their respective strategies in the UK, which have a common goal of enabling a safe digital world by combating cybercrime. Founded in 2003, CSIS has built a solid reputation for innovation, […]


UK Telecommunications Security Act 2021 – 3 Documents Every Telco Executive Should Read 

In 2019, the National Cyber Security Centre conducted The UK Telecoms Supply Chain Review to assess and address potential risks associated with the supply chain of telecommunications infrastructure in the United Kingdom. The review highlighted the risks associated with reliance on certain vendors, particularly those with high-risk profiles. It also recommended increased oversight and regulation to mitigate […]


The Cyber Assessment Framework: A Comprehensive Guide to Strengthening Your Digital Defences

In an increasingly interconnected world where cyber threats are growing in frequency and sophistication, governments and organisations are recognising the critical importance of securing their digital infrastructure and sensitive data.  It is for these reasons that the NCSC has developed the Cyber Assessment Framework (CAF) collection which is intended for use by any organisation that […]

Information Security

Comparing Cybersecurity Standards: CE, Cyber Assurance, and ISO 27001 – Choosing the Right Framework for Your Organisation

With cyber-attacks on small to medium-sized enterprises (SMEs) on the rise, it is more important than ever for businesses to acquire the relevant levels of cyber competency to assure customers that their information is safe. But with so many certifications, it can be hard to know which is appropriate for your business, notwithstanding budgetary concerns, […]


Understanding EDR, XDR, MDR, NDR, SIEM, and SOAR – Exploring Cyber Security Solutions and the Benefits of a Managed SOC

Among the array of cyber security acronyms, EDR, XDR, NDR, MDR, SIEM, and SOAR are gaining prominence. These solutions help organisations detect, respond to, and mitigate security incidents effectively. The threat landscape is ever evolving and in order for organisations to protect themselves it requires robust security solutions.  In this blog post, we will delve into […]