Latest Insights and Cybersecurity Resources

Understanding Supplier Criticality: Why Tiering Risk Isn’t Always Simple

Understanding Supplier Criticality: Why Tiering Risk Isn’t Always Simple


Natasha Scott

In theory, grouping suppliers into high, medium, or low risk should make third-party risk management more efficient. In practice, inconsistent definitions, hidden vendors, rigid models, and limited resources often make it messy and ineffective. This blog explores the five most common reasons why supplier tiering fails - and what you can do to make it meaningful, accurate, and actionable.

Continue
What Is Third Party Risk Management?

What Is Third Party Risk Management?


Natasha Scott

Your suppliers are part of your business – whether they manage your cloud, payroll, or IT. But what happens when they go down, get breached, or drop the ball? In this blog, we break down what Third Party Risk Management really means, why startups and scaleups can't afford to ignore it, and how to build a practical, scalable approach that protects your growth without adding friction.

Continue
Policy, Plan, or Playbook? What Your Incident Management Process Should Really Look Like

Policy, Plan, or Playbook? What Your Incident Management Process Should...


Natasha Scott

Most scaleups and mid-sized businesses either lack an incident response plan or have one that’s unusable when it matters most. This blog lays out a practical, five-layer framework for incident management - spanning crisis planning, policies, IRPs, technical playbooks, and frontline battlecards.

It explains who should own each document, how they fit together, and why a clear, structured approach beats improvisation every time. Designed for IT leaders without security degrees, the blog includes actionable resources to help you build your response system before the breach hits.

Continue
Threat Advisory: Website compromise brings down corporate email

Threat Advisory: Website compromise brings down corporate email


Andrew Papastefanou

How a threat actor exploited a known vulnerability in the Miniorange 2FA plugin to compromise a Wordpress site using a malicious WP Rock plugin, causing unexpected knock-on impacts to the company's email reputation, leading to lost revenue and unnecessary costs.

Continue
Why can’t I get Threat Intelligence that’s relevant to my business?

Why can’t I get Threat Intelligence that’s relevant to my...


Natasha Scott

Many companies rely on generic cybersecurity tools for threat intelligence—but these tools don’t reveal if your business is being actively targeted. Learn why tailored, context-aware threat intelligence is essential for staying ahead of modern cyber threats.

Continue
Navigating the UK Cybersecurity Regulatory Landscape: A Guide for Medium-Sized Enterprises

Navigating the UK Cybersecurity Regulatory Landscape: A Guide for Medium-Sized...


Andrew Papastefanou

Midsize organisations in the UK are subject to a number of mandatory regulations relating to cybersecurity, data protection and data privacy. For IT, security and business leaders, navigating this landscape can be both complex and challenging. Download our summary of the most relevant regulations, key standards and upcoming legislation to best position your organisation to avoid the pitfalls of non-compliance and foster trust amongst your customers, partners and other key stakeholders.

Continue