Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.
New starter: Hishaam Iqbal joins team Equilibrium!
Meet the newest member of team Equilibrium: Hishaam Iqbal. Hishaam has joined our growing technical team as a Cyber Security Engineer. Why did you join
Deep fake: The future of phishing scams?
As phishing scams continue to evolve, scammers look for new ways to trick people into giving up their personal information. With the rise of deepfake
New starter: Jamie Burrows joins team Equilibrium!
Meet the newest member of team Equilibrium: Jamie Burrows. Jamie has joined our growing sales team as a Cyber Security Sales Consultant. Why did you
Should brand monitoring be part of every security strategy?
Today’s consumers rely on the internet to find products and services they need from well-established brands. According to statistics, 91% of consumers only buy from
Is it safe to outsource Cyber Security to a third-party?
Do you ever feel overwhelmed by staying ahead of the latest threats, and protecting your brand from security breaches? You’re not alone. With ever-evolving threats
The difference between ethical hacking & penetration testing
When discussing security testing, the terms ‘ethical hacking’ and ‘penetration testing’ are used interchangeably. It’s important to recognise the differences between the two approaches, as
How to build a more effective Cyber Security awareness programme?
Despite having best-in-class defence systems, many firms still experience security breaches. Unfortunately, you can’t rely on technology alone to prevent attacks. You may have invested
Are social engineering attacks slipping past your users?
No matter how strong your security strategy is, there’s always one vulnerability hackers can try to exploit: Your employees. Social engineering relies on human weaknesses
How successful is your phishing simulation programme?
Most companies run some form of phishing simulation exercises, but how successful are these and do they have the desired effect on reducing the risk
Creating basic, but free blocking and monitoring for your network: Part 1
The defenders dilemma is a real problem, you need to get your security right 100% of the time, whereas an attacker only needs to get