Cyber Security for NHS Suppliers: Tackling healthcare cyber-risk in the wake of the pandemic

The prevalence of cyber-attacks against the NHS supply chain, has significantly accelerated in the past 12 months. When the healthcare sector were under immense pressure at the onset of the pandemic, cyber-criminals took the opportunity to attack an industry in crisis. Although they have always been a prime target for internet criminals, last year we … Read more

CASE STUDY: Safeguarding students from online threats, cyber-bullying & harmful content

ABOUT GREENWOOD ACADEMIES TRUST The Greenwood Academies Trust (GAT) currently has 36 open academies educating approximately 17,000 pupils across seven local authority areas including Nottingham City, Nottinghamshire, Leicester City, Northamptonshire, Peterborough, Lincolnshire and Central Bedfordshire In 2018, Equilibrium were approached by Greenwood Academies Trust to help them achieve their Cyber Essentials certification. However, instead of … Read more

Financial Services: Tackling the ever-growing threat of BEC and email spoofing attacks

For financial services firms, cyber-attacks are the bank robberies of the digital age. Since the advent of computers, criminals no longer need balaclavas, guns or a getaway car on standby. Today’s cyber-criminals can conduct attacks from behind a computer screen. For obvious reasons, financial firms have always been a prime target for cyber-criminals. Unfortunatley, due … Read more

The top 8 Cyber Security trends of 2021

The emergence of Covid-19 has transformed life as we know it, from both a business and personal perspective. In the wake of the first lockdown, businesses were forced to rapidly accelerate digitisation plans. Although this allowed  firms to remain ‘open for business’ during the lockdown, these critical rollouts usually require careful planning and stringent risk … Read more

Don’t let hackers steal your Christmas cheer: The top tips for a ‘cyber-safe’ Christmas

Christmas is a time of relaxation, celebrations and…. cyber-crime. Unfortunatley, hackers won’t be putting their feet up this festive period. Bad actors across globe are eagerly preparing for the ‘holiday hacking season’. As online shopping skyrockets and businesses ‘wind-down’ for Christmas, the festive period becomes a real feast for internet criminals. For many businesses, Christmas … Read more

Hook, line and sinker: Would you fall for these phishing scams?

As the virus began to ravage the world in March this year, there was a sharp increase in the prevalence of phishing attacks. Unfortunately, the Covid19 pandemic provided new opportunities to exploit hardworking tax-payers. According to Google, phishing scams rose by a whopping 350% in April. Although many of these scams focussed on providing fake … Read more

How to build a remote working strategy which will stand the test of time

Over the past 9 months, home working has become ‘the new normal’ for businesses across the globe. The Office for National Statistics reported that in April 2020, 46.6% of people in the UK worked from home – 86% of those as a result of the lockdown. However, when lockdown was first enforced, many firms had … Read more

Explained: The difference between penetration testing and vulnerability scanning

Although there is a crossover between vulnerability scanning and penetration testing, they are two very different ways of testing the resilience of your IT infrastructure. The confusion between the two  can become problematic if a business procures the wrong service. If you are unclear about which service your business needs, read on to find out … Read more

Cyber Awareness Month 2020: 9 ways to improve Cyber Security in the Covid-19 era

October may be the season for Halloween, autumnal leaves and cosy jumpers.… but October also marks the 17th National Cyber Security Awareness Month! This awareness campaign acts as a valuable reminder for organisations to evaluate the effectiveness of their Cyber Security controls, internal processes and data protection measures. Here at Equilibrium, we have joined the … Read more

Securing your cloud-first architecture using Stealthwatch Cloud and Cisco SecureX

In recent years, cloud computing has completely redesigned the way we live and work. Whilst businesses were once bound to on-premise infrastructures, the introduction of ‘the cloud’ has meant that firms can access corporate information using any device which is connected to the internet. Cloud architectures are understandably popular as they provide scalable services for … Read more