Cyber Tec Blog

Catch up on the latest cybersecurity news, insights and advice from Cyber Tec Security.

Why Your Size Does Matter: Hacking Myths That Put..

author

Louise Ralston Nov 18, 2024


Think your SME is too small to be hacked? Discover why size does matter when it comes to cyber threats and how to protect your business from Hacking.
Read More

Monthly Cyber Compliance: The Hackers’ Worst..

author

Louise Ralston Nov 12, 2024


Stay ahead of cyber threats with monthly vulnerability assessments and penetration testing to identify and fix weaknesses, ensuring a robust and secure network.
Read More

MFA - Why Your Second Factor Might Be as Weak as..

author

Louise Ralston Nov 5, 2024


Why phishing-resistant MFA is crucial for modern cybersecurity and how to choose the best MFA to defend against phishing attacks and protect sensitive data.
Read More

Cybersecurity Certifications: The Key to Business..

author

Louise Ralston Oct 21, 2024


Achieve cybersecurity compliance and build customer trust with certifications like Cyber Essentials, Cyber Baseline, and Cyber Assurance. Learn why these certifications are crucial for modern businesses.
Read More

Why Stick to Annual Penetration Tests When..

author

Louise Ralston Sep 30, 2024


Explore the crucial benefits of switching from annual to monthly penetration testing and vulnerability analysis for UK businesses. Learn how Managed Service Providers (MSPs) can effectively use monthly cyber vigilance to thwart hackers and enhance cybersecurity.
Read More

Staying One Step Ahead of Hackers Find your weak..

author

Louise Ralston Sep 16, 2024


Pen testing Cyber Best practices continuous assessments ISO standards vulnerability assessments. Testing continuous security monitoring
Read More

Cyber Security, Compliance and Cyber Essentials..

author

Louise Ralston Aug 28, 2024


Cyber Security, Compliance and Cyber Essentials , pen testing Vulnerability Assessments , cyber security
Read More

Compliance, Cyber security and Certifications –..

author

Louise Ralston Aug 15, 2024


Compliance, cyber security, and certifications are crucial for a winning cyber protection strategy. Learn how integrating these elements can safeguard your organization from evolving cyber threats.
Read More

Automate or Terminate: The Must-Have..

author

Louise Ralston Jul 16, 2024


Enhance your MSP cybersecurity strategy with automation, vulnerability analysis, and expert partnerships. Stay ahead in the fight against cyber threats and gain a competitive edge in the market.
Read More

Why Cybersecurity is a journey, not just a check..

author

Louise Ralston Jul 1, 2024


Discover why cybersecurity is a continuous journey, not just a checkbox exercise. Learn about the importance of Cyber Essentials, penetration testing, and choosing the right partner for your cybersecurity success.
Read More

Crafting a Digital Transformation Strategy: A..

author

Louise Ralston May 8, 2024


Crafting a comprehensive guide on digital transformation strategy, this blog outlines steps to assess current state, define vision, secure leadership buy-in, and develop a strategic roadmap for successful implementation.
Read More

The Importance of Penetration Testing for SMEs:..

author

Louise Ralston Mar 14, 2024


Learn why penetration testing is crucial for SMEs to safeguard their digital assets, identify vulnerabilities, comply with regulations, enhance security, protect customer data, and make cost-effective security investments.
Read More

The Ever Evolving Role of the MSP!

author

Louise Ralston Mar 7, 2024


Discover how Managed Service Providers (MSPs) can strengthen cybersecurity with a proactive approach and Cyber Essentials Certification. Learn about the evolving role of MSPs in safeguarding businesses against cyber threats.
Read More

Is ISO an alternative standard to Cyber..

author

Louise Ralston Feb 29, 2024


Comparing ISO and Cyber Essentials for cybersecurity standards, this blog delves into their differences and importance in safeguarding against cyber threats.
Read More

Is Your Supplier List Your Weakest Link?

author

Louise Ralston Feb 16, 2024


Discover why Cyber Essentials certification should be mandatory for suppliers to strengthen supply chain security and mitigate cyber threats. Safeguard your business and gain a competitive advantage.
Read More

Cybersecurity in the Legal Sector: Embracing..

author

Louise Ralston Feb 12, 2024


Bolster cybersecurity in the legal sector by embracing Cyber Essentials and conducting regular vulnerability assessments.
Read More

Exploring Real-World Examples of Digital..

author

Sam Jones Jan 16, 2024


Discover how digital transformation reshapes industries with our blog post 'Exploring Real-World Examples of Digital Transformation'. Dive into real-world cases from retail to healthcare, illustrating the pivotal role of digital innovation in modern business success. A must-read for forward-thinking professionals.
Read More

The Importance of Vulnerability Scanning: Best..

author

Sam Jones Jan 10, 2024


Discover why vulnerability scanning is essential for businesses and learn best practices to ensure a secure network.
Read More

Tailgating Social Engineering: The Unseen Threat..

author

Sam Jones Dec 6, 2023


Discover how to prevent 'tailgating' in cybersecurity: a simple act with serious consequences. Learn strategies to secure your business.
Read More

Email Security and Social Engineering: Don't Take..

author

Sam Jones Nov 29, 2023


Learn how to shield your business from email-based social engineering attacks. Understand the risks and implement effective security measures.
Read More

Whaling Phishing: The Catch You Never Want to Make

author

Sam Jones Nov 22, 2023


Discover key strategies to protect your business from whaling phishing, a serious cyber threat targeting top executives. Stay secure with us.
Read More

The Critical Importance of Digital Transformation..

author

Sam Jones Nov 16, 2023


Explore the vital role of digital transformation in today's business landscape and how Cyber Tec Security guides SMEs in this journey.
Read More

Streamlining Success: The Power of Modern Supply..

author

Sam Jones Oct 12, 2023


Discover the power of modern supply chain management systems and how they streamline operations and enhance efficiency in distributing goods and services. Explore the role of technology, such as AI and blockchain, and the importance of cybersecurity in this fascinating world.
Read More

How Do Hackers Steal Passwords?

author

Cyber Tec Security Jul 25, 2023


A guide to the techniques hackers use to capitalise on security weaknesses and what you can do to stop them in their tracks.
Read More

How do you overcome the cyber security skills gap..

author

Cyber Tec Security Jul 11, 2023


Learn how to keep employees and businesses cyber safe in the global shift to remote working.
Read More

It's World Password Day! Click here if you forgot.

author

Cyber Tec Security May 4, 2023


Is this the end of passwords?
Read More

How Do Hackers Enter Your System? Exploiting..

author

Carl Torrence Apr 17, 2023


In this article we'll look in detail at some of the most common cyber attacks that hackers use to target individuals and organisations.
Read More

Five Cyber Security Myths & How To Overcome Them

author

Cyber Tec Security Mar 31, 2023


Five common cyber security inaccuracies and the updated, actionable advice to ensure optimum protection of your company’s systems, networks and people.
Read More

Cyber Essentials UPDATE: Here's What You Need To..

author

Cyber Tec Security Mar 6, 2023


The Cyber Essentials standard is changing. Find out what IASME and the NCSC have been working on...
Read More

The Password Book - Is it Risky or Rational?

author

Sam Jones Feb 7, 2023


With credential breaches happening left, right and centre - where are your passwords most secure, a password book or a password manager?
Read More

What is Penetration Testing and why is it like..

author

Cyber Tec Security Feb 1, 2023


An article to explain the basics, the types and the alternative...
Read More

How To Get The Cyber Essentials Logo On Your..

author

Cyber Tec Security Jan 30, 2023


Every website seems to have the Cyber Essentials logos but what are they and what can they do for your organisation?
Read More

Don’t Panic! Here’s What To Do If You Clicked On..

author

Sam Jones Jan 24, 2023


Have you clicked on a phishing link? Learn how to do damage control here and avoid being fooled again!
Read More

Black Friday Scams: What To Look Out For

author

Cyber Tec Security Nov 17, 2022


Black Friday scams can ruin anyone's fun when shopping for deals. Read on to find out what you need to be looking out for this Black Friday...
Read More

How Should a Company Handle a Ransomware Attack?

author

Cyber Tec Security Nov 10, 2022


If your company has been hit or you're wondering what you would do in such a situation, find out our 6 steps for handling a ransomware attack...
Read More

Types of Ransomware: The Risks and the..

author

Cyber Tec Security Nov 2, 2022


Ransomware attacks can be hugely damaging, but what are the different types of ransomware out there and how can businesses protect themselves?
Read More

What is Social Engineering: The Ultimate Guide

author

Cyber Tec Security Oct 10, 2022


What is social engineering and how can you protect your business against these inevitable attacks? Read our Ultimate Guide to find out...
Read More

Black Box Penetration Testing: What Is It and Is..

author

Cyber Tec Security Sep 28, 2022


Black box penetration testing is the name given to the style of testing where the pen tester is given no access to your systems and no inside knowledge...
Read More

What is Supplier Due Diligence and Why is it..

author

Cyber Tec Security Sep 22, 2022


Performing supplier due diligence is essential for any company entering into a new working relationship with a supplier to reduce risk exposure...
Read More

How to Prevent Ransomware Attacks

author

Cyber Tec Security Sep 6, 2022


Ransomware is one of the biggest cyber threats facing businesses today. Read on as we look at how ransomware affects companies and how to prevent attacks.
Read More

What is Network Penetration Testing and How Can..

author

Cyber Tec Security Aug 23, 2022


One of the most common pen tests is network penetration testing. Read on to find out what's involved and what to consider before buying one...
Read More

Don't Let Your Security Suffer Because of This..

author

Cyber Tec Security Aug 9, 2022


With so many business priorities and only a number of staff to dedicate time to them, cyber security can often fall off the radar...
Read More

Cyber Security for Business: Back to Basics

author

Cyber Tec Security Aug 4, 2022


The fear of the complexity of cyber security convinces many of us to ignore it, until you can’t. Read on for a no-nonsense introduction to cyber security.
Read More

5 Beliefs About Cyber Crime That are Putting Your..

author

Sam Jones Jul 26, 2022


Cyber security is now a bigger priority, but small businesses are still holding onto falsehoods that are putting them at risk...
Read More

The Dream Team Your Company Needs

author

Cyber Tec Security Jul 19, 2022


IT teams do a great job at keeping businesses up and running, but there's someone else essential that every IT wizard needs by their side...
Read More

How to Handle the Cost of Cyber Security

author

Sam Jones Jul 12, 2022


Is the cost of cyber security a big concern for your business? Read on as we aim to show you how to focus your budget to get the most value for money... 
Read More

Top 5 Cyber Security Awareness Training Companies..

author

Ella Taylor Jun 28, 2022


Cyber security awareness training is an essential part of every company's cyber security strategy. Here are our top 5 companies offering training solutions
Read More

5 Types of Penetration Testing Examined

author

Cyber Tec Security Jun 21, 2022


Learn more about the different types of penetration testing and how they can help to protect your business from cyber attacks.
Read More

What is Clone Phishing and Does it Really Work?

author

Cyber Tec Security Jun 15, 2022


Clone phishing is a particularly insidious form of phishing that seeks to benefit from your existing trusted relationships. Read on to find out more...
Read More

What is URL Phishing and How to Avoid an Attack

author

Sam Jones May 10, 2022


URL Phishing is a popular technique using malicious links and fake websites to extract sensitive information. Read on to learn how to avoid these attacks.
Read More

How to Get Reduced Cyber Insurance for Your..

author

Cyber Tec Security Apr 22, 2022


Cyber Insurance premiums have risen over the last few years due to an increase in cyber incidents. How can businesses ensure they're protected on a budget?
Read More

Securing the Metaverse: The Risks and..

author

Ella Taylor Mar 25, 2022


Zuckerberg defines the Metaverse as the moment when ‘immersive digital worlds become the primary way that we live our lives and spend our time’.
Read More

Ukraine Cyber Attacks: What You Need to Know

author

Ella Taylor Mar 3, 2022


The tragic events in Ukraine dominating our news outlets have had implications in numerous areas. Here we look at what's happening in the cyber space...
Read More

Top 10 UK Pen Testing Companies

author

Ella Taylor Feb 21, 2022


Choosing the right company to carry out a penetration test on your organisation is important - read on as we explore the top 10 UK pen testing companies.
Read More

Cyber Essentials Checklist: Are You Cyber..

author

Sam Jones Feb 7, 2022


Do you have what it takes to pass Cyber Essentials Plus? Read on as we walk through the key technical requirements on your Cyber Essentials checklist...
Read More

Cyber Essentials: What's New in 2022?

author

Cyber Tec Security Jan 18, 2022


The Cyber Essentials standard is changing. Find out what IASME and the NCSC have been working on and what we can expect the scheme to look like in 2022...
Read More

Bring Your Own Device (BYOD) Security Risks

author

Sam Jones Dec 8, 2021


BYOD is no new concept. Allowing employees to use their own devices has a number of benefits but it is important to first address the security risks...
Read More

What is Vishing and and How to Stop it Happening..

author

Sam Jones Nov 30, 2021


What is vishing? We use the term vishing to describe a kind of social engineering attack that happens over the phone...
Read More

Top 5 Vishing Attacks and How to Avoid Them

author

Sam Jones Nov 23, 2021


Find out about 5 common vishing attacks and how to make sure you don’t get caught out by them.
Read More

Phishing, Vishing and Smishing: What’s the..

author

Ella Taylor Nov 16, 2021


To the untrained eye, phishing, vishing and smishing might look like gibberish, but in reality, these are cyber threats that can be quite damaging.
Read More

Cyber Essentials: Why Go Guided?

author

Sam Jones Oct 7, 2021


The Cyber Essentials assessment is in its most basic form a self-assessed questionnaire - but you don't have to go it alone! Read on to find out how...
Read More

IASME Acquired by Phenna Group

author

Cyber Tec Security Oct 4, 2021


As of September 30th 2021, The IASME Consortium was acquired by Phenna Group...
Read More

How to Identify Supply Chain Risk in Your Small..

author

Guest Contributor Jul 29, 2021


Mapping out the specific supply chain risks is the first step in building your risk management process.
Read More

Top 6 Cyber Security Companies in Bristol

author

Sam Jones Jul 23, 2021


After a Bristol-based company that offers cyber security? We've narrowed down our top 6 companies below.
Read More

How to Assess Supplier Risk in Your Supply Chain

author

Sam Jones Jul 19, 2021


Supplier risk management is key to your Supply Chain's security, but how do you know how secure your suppliers really are?
Read More

6 Best Password Managers in 2021

author

Sam Jones Jul 12, 2021


Whether you're looking for personal password management or for your business, read on to discover who wins the title: 'best password manager 2021'
Read More

Cyber Security for SMEs - Why Bother?

author

Sam Jones Jul 5, 2021


Cyber Tec Security and Police Digital Security Centre are working together to educate SMEs on the importance of cyber compliance and security standards...
Read More

The Advantages and Disadvantages of Cloud..

author

Clive Madders Jun 14, 2021


In simple terms, cloud computing refers to anything that involves the delivery of hosted services over the internet, often on a pay-as-you-go basis.
Read More

Wait! Do You Need a Penetration Test or a..

author

Sam Jones May 18, 2021


Pen Testing is a big name in the world of cybersecurity, but it's not the right approach for every business. Sometimes there's a much better solution...
Read More

Top 4 Office 365 Security Concerns and Best..

author

Sam Jones May 5, 2021


With around 258,000,000 active monthly users, Office 365 is the go-to software suite for businesses. Here we explore common Office 365 security concerns...
Read More

How to Manage Your Supply Chain Risk

author

Sam Jones Apr 27, 2021


How do you manage your supply chain cyber risks? Poor Supply Chain management can put you in a vulnerable position. All you need is an effective strategy..
Read More

Top 5 Supply Chain Security Best Practices

author

Sam Jones Apr 19, 2021


We know how important suppliers are to a thriving business, but not at the cost of a cyber attack. Read on for some Supply Chain Security best practices...
Read More

How Secure Is Your Supply Chain?

author

Sam Jones Apr 12, 2021


Weak supply chains are easy targets for cybercriminals and many businesses are still neglecting this area of their cybersecurity...
Read More

What is Supply Chain Security and Why is It..

author

Sam Jones Apr 6, 2021


Supply Chain Security involves managing both physical threats and cyber threats, all the way from terrorism and piracy to non-compliance and data loss...
Read More

Why 'If it Ain't Broke, Don't Fix it' is Bad..

author

Sam Jones Mar 3, 2021


Nothing lasts forever, and that couldn’t be more true of operating systems. If you're on end-of-life OS you could be putting your business at risk...
Read More

Top 10 UK Cyber Security Companies

author

Sam Jones Feb 19, 2021


Finding the right cybersecurity solution is a daunting task, so we’ve put together a list of the top 10 UK cyber security companies
Read More

NEW Partnership with the Police Digital Security..

author

Cyber Tec Security Feb 9, 2021


The Police Digital Security Centre is partnering with Cyber Tec Security, in a move designed to encourage UK SME’s to invest in their cyber security.
Read More

Don’t Wait to Start Selling Cyber Essentials...

author

Sam Jones Oct 27, 2020


Torn between getting certified and getting sales? In this article, we'll show you how you can be doing both - right now...
Read More

How Can UK Businesses Secure Their Supply Chain?

author

Sam Jones Sep 1, 2020


Third-party breaches are on the rise, it's more important than ever to secure your organisation to prevent being the cause of a supply chain breach...
Read More

How to Sell Cyber Essentials Without Becoming a..

author

Sam Jones Jul 1, 2020


It's a common misconception that your business needs to be a certifying body in order to supply Cyber Essentials to the market...
Read More

Small Businesses Don't Need Cyber Security,..

author

Sam Jones May 21, 2020


Small businesses are safe right? Unfortunately this couldn't be further from the truth. If you own a small business, here's why you may be in trouble...
Read More

The 4 BEST Password Managers in 2020

author

Sam Jones Apr 15, 2020


There's plenty of password managers floating around the internet but which is the best for your business...
Read More

Cyber Essentials Plus - Now 100% Remote!

author

Sam Jones Mar 31, 2020


How is it possible to achieve Cyber Essentials Plus within the current climate? It must be impossible right? Well, we've found a way to do it...
Read More

31 Cyber Security Influencers You NEED to Be..

author

Sam Jones Mar 27, 2020


We've compiled a list of 31 cyber security influencers you can follow to make sure you never miss out on the latest news and insights again...
Read More

11 Cyber Security Tips For Remote Working..

author

Sam Jones Mar 19, 2020


COVID-19 has forced many businesses to operate from home but what can staff do to stay secure? Let's find out...
Read More

Why Your Suppliers Are Asking You To Get Cyber..

author

Sam Jones Feb 14, 2020


Have you recently had your suppliers ask you to get certified for Cyber Essentials? Here's what you need to know and do to be able to get certified...
Read More

Cyber Essentials is Coming to America! What Does..

author

Sam Jones Nov 13, 2019


The UK Cyber Essentials scheme has been a huge success. CISA has decided to bring the scheme to America for their SMEs. Here's what it means...
Read More

How Much Does Cyber Essentials and Cyber..

author

Sam Jones Oct 31, 2019


If you're thinking about Cyber Essentials for your organisation and wondering 'how much does Cyber Essentials costs?' read on for a full break down...
Read More

How to get FREE Cyber Insurance

author

Sam Jones Oct 24, 2019


You can pay for your organisation's Cyber Insurance or you can get it free with a Cyber Essentials certification...
Read More

How to Improve Cyber Security with Security..

author

Sam Jones Oct 17, 2019


So you've achieved Cyber Essentials but how do you improve your cyber security even further? Let's find out what SOC and SIEM tools can do for you...
Read More

The Ultimate Guide To Cyber Essentials

author

Cyber Tec Security Oct 8, 2019


We've created this FREE Ultimate Guide to Cyber Essentials to help you understand the certification's fundamentals and answer all your questions...
Read More

IASME Wins Cyber Essentials Partnership: What..

author

Sam Jones Oct 7, 2019


How does IASME winning impact your organisation? Is this a nightmare or an opportunity? Sit back and relax whilst I explain everything you need to know...
Read More

What is a Subject Access Request and How Do I..

author

Sam Jones Oct 4, 2019


Here are 7 easy steps to providing the RIGHT information to your customers and dealing with subject access requests...
Read More

Listening to Your IT Support Could Cost You 4% of..

author

Sam Jones Oct 4, 2019


Your IT support company are great but when it comes to Cyber Security, it's best to trust the experts...
Read More

What is Cyber Essentials and Why Does It Matter?

author

Sam Jones Oct 4, 2019


The only government-backed cyber security standard in the UK is worth explaining, so let's get into it: What is Cyber Essentials...
Read More

Is the Cyber Essentials Scheme Worth It For Your..

author

Sam Jones Oct 4, 2019


Too expensive? Value for money? Is the Cyber Essentials scheme right for your business? Grab your tea and a biscuit and let's dive into this...
Read More

10 SUPER Surprising Cyber Essentials Benefits

author

Sam Jones Oct 4, 2019


Cyber Essentials offers a LOT more than you may have originally thought. Here are 10 Cyber Essentials benefits for your organisation...
Read More

Four Steps to Building a Cybersecurity Strategy -..

author

Sam Jones Jul 5, 2019


If you're an SME there's a good chance you could experience a data breach. Here are 4 steps for building a cybersecurity strategy that keeps hackers out...
Read More

The Difference Between Cyber Essentials and Cyber..

author

Sam Jones Jul 4, 2019


Cyber threats are ever-growing and businesses are seeking accreditation like Cyber Essentials and Cyber Essentials Plus - but which is right for you?
Read More

Do I Need Cyber Essentials or Cyber Essentials..

author

Sam Jones Jul 3, 2019


Struggling to get to grips with Cyber Essentials or Cyber Essentials Plus? - Here's what you need to know and why people are asking you to get it...
Read More

About us

Cyber Tec Security are an IASME qualified Certification Body, working to improve the security health of businesses across the UK by achieving the Cyber Essentials certification.

We help businesses through the certification process and beyond, with advanced solutions such as Ongoing Compliance, SOC & SIEM, Penetrating Testing and much more – so you can achieve maximum security all under one roof.

Subscribe