Top mobile security threats and how to protect against them

Our mobile phones are rarely more than an arm’s reach away, they are our fastest gateway to the digital world, and this is not something that has gone unnoticed by hackers. Here we will look at the top mobile security threats and how you can protect against them.   According to the ONS report for…

Read More

How is Artificial Intelligence changing cybersecurity?

Today we will look at how AI is changing cybersecurity and what it means for business. As touched on in our last article, Cybersecurity challenges and trends for 2023, the new year brought with it further acceleration and adoption of artificial intelligence led security systems, anti-virus software and in contrast, automated machine learning hacking tools.…

Read More

October is European Cyber Security Month

With October being the 10th Annual European Cyber Security Month, we thought it would be a good idea to summarise some key principles and recent cyber security industry updates. We will also cover some events and activities over the month you can participate in as part of an international programme of cyber security related content…

Read More

What will Web3 mean for cybersecurity?

What is Web3 and why is it happening? At 33 years old, the internet has become both omnipresent in the lives of a vast number of people globally, and omniscient in the way it collects data on us, knows our preferences, our habits, our routines, location, personal information, and the things we like to watch…

Read More

Top cyber security trends of 2022 – an SRM leaders guide

Pie Security - Digital Trust

  Security and risk management (SRM) leaders will be more than familiar with the feeling of playing ‘whack-a mole’ with emerging cyber security threats. However, post-pandemic 2022 has been no ordinary year. The evolution of the cyber security role is evident, and the board and public’s perception of risk are beginning to align which has…

Read More

Password protection pitfalls and how to avoid them.

What’s in a name? We are frequently reminded and prompted every time we make a new password to ensure it is ‘strong’ and not easily guessable or hackable by bad actors and hackers. Despite these warnings many people still use repeated passwords or combinations of names of loved ones and birthdays or other significant dates…

Read More

How to build brand trust online

Brand theft and ‘form jacking’ In our recent articles we have been discussing the scope of online threats and the ways you can protect and mitigate against cyber-attacks. Be they through your email, connected networks or digital assets, these threats exists and one issue this has created that we haven’t yet touched upon is an…

Read More

Keep up to speed with Cyber Security

In a previous post we looked at Cyber Hygiene and the importance of building cyber security practices into the heart of your operations.  In this article we will be furthering the philosophy that prevention is better than cure, with a comprehensive list of resources that can help you keep up to speed with the rapid…

Read More