Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.
AppCheck: The Importance of Regular Vulnerability Scanning
Why run regular security tests? As we probably all know, information security is a broad subject and for many of us understanding the different layers
AppCheck: Detect Rogue JavaScript Crypto-Miners
Browser based Crypto-Mining malware has made a dramatic resurgence in 2018 hitting the headlines on several occasions over the past month. Most recently, two major
Natwest Event: CYBER SAVVY? GDPR READY? LETS PROTECT YOU & YOUR CUSTOMERS
REGISTER HERE The UK’s internet economy is one of the strongest in the world, international and domestic cyber criminals increasingly view UK-based businesses and private
Equilibrium achieve Advanced Security Accreditation and become Cisco Premier Partners!
We are excited to announce that we have recently achieved our Advanced Security Accreditation and are now Cisco Premier partners. As a specialist security provider
Final GDPR installment in the Birmingham Business Post
Take a read of our third and final GDPR installment in the Birmingham Business post. Find out what steps you need to take in the
Cyber Awareness Month Week 4: How can we help protect your business from cyber threats?
As October is Cyber Awareness month, we have joined the national campaign to raise awareness about the importance of Cyber Security. Over the course of
Barclays business digital seminar
This seminar is based around conducting business digitally. With cyber crime in the news on an almost daily basis it is important to understand how
NEW SECURITY ALERT. Anish Chauhan’s advice on the WPA and WPA 2 vulnerabilities
Yesterday, a security issue involving protocol-level vulnerabilities in WIFI Protected Access (WPA) and WIFI Protected Access II (WPA2) was discovered. What is the vulnerability? These
Cyber Awareness month: The rise of Ransomware
What is Ransomware? Ransomware is a type of malicious software which takes control of its victims device and encrypts the data making it unobtainable. The
Second GDPR Installment in Birmingham Business Post
[cs_content][cs_element_section _id=”1″][cs_element_row _id=”2″][cs_element_column _id=”3″][cs_element_image _id=”4″][cs_element_text _id=”5″][/cs_element_column][/cs_element_row][/cs_element_section][cs_element_section _id=”11″][cs_element_row _id=”12″][cs_element_column _id=”13″][cs_element_button _id=”14″][/cs_element_column][/cs_element_row][/cs_element_section][/cs_content]