Love it or hate it, social networking has firmly embedded itself into the fabric of our world. The likes of Facebook, Twitter and LinkedIn can be powerful business tools, especially for marketing, communication and recruitment purposes. […]
Excited to share the news that we’ve been shortlisted in the Risk Management Team of the Year category at the CIR Risk Management Awards 2016!
We’re pleased to announce that we’ve been selected as a Finalist in the Security Company of the Year category at the Computing Security Awards 2016! The winner will be decided by public vote so please visit Computing Security Awards and cast your vote for us now! Voting closes 5th October 2016.
We’re pleased to announce that CS Risk Management have been named one of AI Awards 2016 Businesses of Distinction!
We’ve pleased to have been selected as winner of the Most Exceptional Business in United Kingdom in the AI Most Exceptional Business Awards!
In February 2016, hackers hit the headlines again as news broke of a cyber attack on Bangladesh’s central bank. Specially crafted malware was used to hack into Bangladesh Bank’s SWIFT software, allowing the hackers to transfer $81 million from Bangladesh’s account at the Federal Reserve Bank of New York into accounts held at other banks, reportedly in the Philippines.
When we think of IT systems and Industrial Control Systems (ICS) we tend to think that there is a vast difference in the way they are secured and managed but in reality there is little difference in the approach needed to secure the two separate system types.
With so many potential demands on a limited Information Security budget, is Security Awareness training a good investment? It’s something that has been debated in companies for years and will be for years to come. […]
Cyber-extortion and blackmail are not new, but cyber-criminals have just about perfected their techniques of extracting money from the masses through the use of ransomware.
Businesses rely on data stored on their PCs, mobile devices and the cloud more and more each day – not necessarily important enough to make sure it is backed up reliably, but certainly enough to panic when criminals encrypt their data and then offer a decryption key at a price. […]