Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Digital Prepping - Why It Pays To Be Prepared

Prepping is a way of life for people all across the world - it's the practice of making active preparations for a possible catastrophic disaster or emergency, typically by stockpiling food, ammunition and other supplies. Digital prepping however, is ensuring you, your networks, data and digital assets are ready for the very real possibility of a potential future cyber attack. So... are YOU ready?

Could You Outsmart a Phishing Scam?

We’ve all had it happen. You receive an email telling you that you’ve won a prize draw you never entered or a foreign prince wants to transfer you a huge sum of money and needs your bank details. These obvious scams can be spotted from a mile away and are what we tend to think of when we think of phishing, but it’s not always that apparent. Over the years, phishing scams have become harder to detect and many have fallen victim as a result.

Spotlight on Technology: Privileged Access Management

In the second of our new series, Spotlight on Technology, we take a look at privileged access management with James Rees MD of Razorthorn cyber security consultancy, & David Higgins, EMEA Technical Director of CyberArk, leaders in identity security and access management. Accounts with privileged access are gold dust for malicious actors and gaining access to these, and the sensitive data these accounts have access to, can cause some huge and costly problems for the targeted organisation.

A View of Cyber Security from a National & Regulatory Viewpoint

In this 25 minute video, we take a look at the state of cybercrime and security from a national and regulatory standpoint. We know that there are problems with our existing cyber security - whether that's within CNI and governments or organisations, large or small. The Colonial Pipeline hack is evidence enough.

How to Secure Your Supply Chain

We've talked about supply chain security before but it's a trend that doesn't appear to be going away - indeed, the number of attacks on service providers only seems to be increasing. Outsourcing is always a strategic risk for any business, but knowing that these attacks are getting more prevalent, what do you need to be doing to make sure your supply chain in secure? We talk about what needs considering to ensure your data isn't compromised by third party security issues. (Start at 7 mins 33 secs to skip to the 'how to').