Skip to content
  • Call us: +44 121 663 0055
  • Penetration Testing
    • CREST Penetration testing
    • Web Application Penetration testing
    • External Network Penetration Testing
    • Internal Network Penetration Testing
    • Mobile App Penetration testing
  • Cyber Essentials Scheme
    • Cyber Essentials
    • Cyber Essentials Plus
    • IASME Cyber Assurance
  • Cyber Awareness
    • Cyber Security Training For Employees
    • Email Phishing Simulation Services
  • Who we are
  • Contact us
  • Penetration Testing
    • CREST Penetration testing
    • Web Application Penetration testing
    • External Network Penetration Testing
    • Internal Network Penetration Testing
    • Mobile App Penetration testing
  • Cyber Essentials Scheme
    • Cyber Essentials
    • Cyber Essentials Plus
    • IASME Cyber Assurance
  • Cyber Awareness
    • Cyber Security Training For Employees
    • Email Phishing Simulation Services
  • Who we are
  • Contact us
More
More
More

Tag: pokemon go

Our services
Book an expert call
Man looking into a universe of cyber security

DDoS attack takes down Pokémon Go

Learn about the recent DDoS attack on the worldwide phenomenon that is Pokémon Go.

Read More

Recent Tweets

We are on Twitter
Retweet on Twitter Equilibrium Security Retweeted
CyberEssentials avatar; Cyber Essentials @CyberEssentials ·
13 Jan 1878805523400675383

Congratulations to the following companies who are now certified to #CyberEssentials via our great Certification Bodies: The Computer People via @D2NA and @QuaysideWealth via @EquilibriumSS

Image for the Tweet beginning: Congratulations to the following companies Twitter feed image.
Reply on Twitter 1878805523400675383 Retweet on Twitter 1878805523400675383 2 Like on Twitter 1878805523400675383 2 Twitter 1878805523400675383
EquilibriumSS avatar; Equilibrium Security @EquilibriumSS ·
14 Oct 1845757949005721733

When Was Your Last User Access Control Audit? 🛡️

Even with solid controls in place, it's important to regularly review user access to ensure everything is still aligned with your organisation’s current needs.

Let’s highlight the core areas to review:

Image for the Tweet beginning: When Was Your Last User Twitter feed video.
Reply on Twitter 1845757949005721733 Retweet on Twitter 1845757949005721733 0 Like on Twitter 1845757949005721733 0 Twitter 1845757949005721733
EquilibriumSS avatar; Equilibrium Security @EquilibriumSS ·
11 Oct 1844657797268390192

Time to Fine-Tune Your Malware Protection? 🛡️

Your malware protection is already doing its job, but a quick review can help keep everything running at its best. It’s a good opportunity to check that your setup is aligned with best practices.

Here are a few areas to look at:

Image for the Tweet beginning: Time to Fine-Tune Your Malware Twitter feed video.
Reply on Twitter 1844657797268390192 Retweet on Twitter 1844657797268390192 0 Like on Twitter 1844657797268390192 0 Twitter 1844657797268390192
EquilibriumSS avatar; Equilibrium Security @EquilibriumSS ·
8 Oct 1843568920885698717

Is Your Patch Management Policy Due for a Review? ⌚

You know the value of a strong patch management process, but when was the last time you reviewed it for gaps or improvements? October is the perfect time to take a fresh look and ensure everything’s running smoothly.

Image for the Tweet beginning: Is Your Patch Management Policy Twitter feed video.
Reply on Twitter 1843568920885698717 Retweet on Twitter 1843568920885698717 0 Like on Twitter 1843568920885698717 0 Twitter 1843568920885698717
EquilibriumSS avatar; Equilibrium Security @EquilibriumSS ·
4 Oct 1842181856717935063

With October starting, that can only mean one thing… Cyber Awareness Month. (We know you were thinking about Halloween! 🎃)

Throughout October, we’ll be highlighting some essential Cyber Security practices that might have slipped off the radar.

Image for the Tweet beginning: With October starting, that can Twitter feed video.
Reply on Twitter 1842181856717935063 Retweet on Twitter 1842181856717935063 0 Like on Twitter 1842181856717935063 0 Twitter 1842181856717935063
EquilibriumSS avatar; Equilibrium Security @EquilibriumSS ·
1 Oct 1841102909926171107

Considering investing in a penetration test but unsure how to prepare?

Our guide breaks down exactly what you need to know before, during, and after your pen test. Whether it's backing up critical data, understanding the scope, or knowing what to expect in the final report.

Image for the Tweet beginning: Considering investing in a penetration Twitter feed image.
Reply on Twitter 1841102909926171107 Retweet on Twitter 1841102909926171107 0 Like on Twitter 1841102909926171107 0 Twitter 1841102909926171107
Load More

Recent News

See all blogs

ISO 27001 vs Cyber Essentials: Do You Need Both?

Cyber Breaches Survey 2025: The Information You Need To Know

The Cyber Assessment Framework (CAF) Explained

See all blogs

Chat to an expert

enquiries@equilibrium-security.co.uk
0121 663 0055

The Colmore Building,
20 Colmore Circus,
Queensway,
Birmingham, B46 AT

  • Who We Are
  • Contact Us
  • Client Feedback
  • Become A Partner
  • Careers
  • Complaints
  • Privacy Policy
  • Who We Are
  • Contact Us
  • Client Feedback
  • Become A Partner
  • Careers
  • Complaints
  • Privacy Policy
  • CREST Penetration testing
  • Penetration Testing Types
  • Cloud Security Penetration Testing
  • AWS Penetration Testing
  • Google Cloud Penetration Testing
  • Network Penetration Testing
  • Social Engineering Penetration Testing
  • Vulnerability Management
  • Website Penetration Testing
  • ISO 27001 Penetration Testing
  • Penetration Testing PCI DSS
  • Brand Monitoring & Protection
  • CREST Penetration testing
  • Penetration Testing Types
  • Cloud Security Penetration Testing
  • AWS Penetration Testing
  • Google Cloud Penetration Testing
  • Network Penetration Testing
  • Social Engineering Penetration Testing
  • Vulnerability Management
  • Website Penetration Testing
  • ISO 27001 Penetration Testing
  • Penetration Testing PCI DSS
  • Brand Monitoring & Protection
  • Cyber Essentials Scheme
  • Cyber Essentials Plus
  • Cyber Security Training For Employees
  • Cyber Liability Insurance
  • Certificate Expiry Dates
  • Cyber Essentials — How Long?
  • Cyber Essentials Accreditation Bodies
  • Cyber Essentials Cost
  • IASME Cyber Essentials/Assurance
  • Passing Cyber Essentials Plus
  • Cyber Essentials Certification
  • Cyber Essentials Plus Differences
  • Who Has Cyber Essentials?
  • Importance of Cyber Essentials
  • Cyber Essentials Scheme
  • Cyber Essentials Plus
  • Cyber Security Training For Employees
  • Cyber Liability Insurance
  • Certificate Expiry Dates
  • Cyber Essentials — How Long?
  • Cyber Essentials Accreditation Bodies
  • Cyber Essentials Cost
  • IASME Cyber Essentials/Assurance
  • Passing Cyber Essentials Plus
  • Cyber Essentials Certification
  • Cyber Essentials Plus Differences
  • Who Has Cyber Essentials?
  • Importance of Cyber Essentials
CREST LOGO
Birmingham City Football Club Community Partner Logo
Cyber Essentials Logo
All rights reserved to Equilibrium | Designed by Squibble
Facebook X-twitter Linkedin

Privacy Policy

  • Contact us
  • Our Blog
  • The Cyber Hot Seat Podcast
  • Case Studies
  • Our services
  • Careers
  • Become A Partner
  • Client Feedback
  • Contact us
  • Our Blog
  • The Cyber Hot Seat Podcast
  • Case Studies
  • Our services
  • Careers
  • Become A Partner
  • Client Feedback
  • Home
  • Who we are
  • Our services
    • CREST Penetration testing
    • The Cyber Essentials Scheme
    • Cyber Essentials Plus
    • Cyber Security Training For Employees
    • Email Phishing Simulation Services
  • Contact us
  • Our Blog
  • Client Feedback
  • Careers
  • Become A Partner
  • The Cyber Hot Seat Podcast