Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.
Protecting Office365: Are built-in security features enough to protect your data?
Protecting Office365: Are built-in security features enough to protect your data? As our email accounts are the backbone of business communications, it is of no
The NCSC announce that Iasme will be the sole Cyber Essentials accreditation body from April 2020
The National Cyber Security Centre has recently announced that IASME will take over as the sole accreditation body for Cyber Essentials from April 2020. After a lengthy deliberation process The IASME Consortium Ltd was named as the new
Are third party software applications exposing businesses to cyber-threats?
When it comes to vulnerability management, you cannot fix the flaws you don’t know about. In a nutshell, visibility is everything. The more you know
New starter: Will Tams joins the team as a Business Development Manager
Having worked within the IT industry for the last 15 years and the last 9 ½ as an Account Manager, my move to Equilibrium was
How can the financial services industry protect their data from increasingly sophisticated cyber-attacks?
Investment into robust Cyber Security measures needs to be a critical concern for all financial services organisations. For obvious reasons, financial firms have always been
How should retailers respond to the rising threat of POS attacks?
Over the past few years, retailers have faced an unprecedented increase in malicious attacks targeting POS systems. It is of no surprise that these machines
Why are Continuous Scans Important for Vulnerability Management?
To protect against evolving digital threats, organisations must have a proactive approach to tackling them. Unfortunately, many businesses do not treat cyber security as an
Behind the scenes at Equilibrium Security part 2- Cyber Essentials
One of the services we offer is Cyber Essentials assessments. This is split into two assessments, the self-assessment: which is based on answering a list of questions;
Why should businesses use 2-factor authentication?
With so much of our lives happening online, it is no surprise that our digital accounts have become a magnet for cyber criminals. As users
The Need for Email Security – Protecting from Ransomware and more
When it comes to cyber-attacks, email is still the most common threat vector. Businesses can be bombarded with socially engineered phishing attacks with malicious attachments