Article

October is Cyber Security Awareness Month!

Bringing Cyber Security to the forefront. With ransomware attacks taking place every 14 seconds and cyber crime projected to cost the world $10.5 trillion annually by 2025, cyber security is more important than ever, with every individual needing to take responsibility. Recognised by many countries around the world, October is Cyber Security Awareness Month, an […]

October is Cyber Security Awareness Month! Read More »

Notebook with Plan written on it

What is the purpose of an incident response plan?

“…And none of us had a playbook…there’s a thing they say; ‘Ok, this is happening now. Crack this open and it’s going to give you the playbook of how to deal with this.’ It wasn’t there.” – Dan Bartlett, Former White House Deputy Communications Director. Having recently watched the BBC documentary ‘9/11: Inside the President’s War Room’, the

What is the purpose of an incident response plan? Read More »

Cyber incident management platform buzz words

Choosing a cyber incident management platform

Efficiently dealing with an incident or crisis weighs heavily on three main factors; preparation, process and the tools you have to hand. The latter can greatly influence your incident management process and a cyber incident management platform should make the implementation of your incident response quick and easy rather than hinder it. Your incident management

Choosing a cyber incident management platform Read More »

Convergent Risks acquisition of Logically Secure

Convergent is pleased to announce that it has acquired Logically Secure Limited, the Cheltenham headquartered, technical testing, incident response and cyber security consultancy business. Logically Secure’s market leading CyberCPR™ incident response and case management platform enables teams to work together on sensitive information and files regardless of where they are in the world and is

Convergent Risks acquisition of Logically Secure Read More »

6 steps to defending your business with Incident Response

What are the phases of incident response and what are the key points within each? In this article we look at the 6 phases of incident response, to help you defend your business, in detail: Preparation Detection and Identification Containment Eradication Recovery Lessons learnt, Defining a ‘Cyber Incident’ The US Health Insurance Portability and Accountability

6 steps to defending your business with Incident Response Read More »

Penetration Testing

What’s wrong with having an internet facing login page? – SQL injection in Aptean

Exposing administrative interfaces can be dangerous – SQL injection in Aptean TLDR; We have found a time-based SQL injection in Aptean Product Configurator v4.0 SP6 – 4.61.0000 which allowed for database access. Have you ever wondered what are the risks of leaving a login interface exposed to the internet? You have probably already thought of weak

What’s wrong with having an internet facing login page? – SQL injection in Aptean Read More »

Why Cyber Security is important for small businesses

Cyber Security – a business necessity, not just a nice-to-have As technology offers small and medium enterprises (SMEs) so many more opportunities, so does it bring increasing and new cyber risks. For SMEs, the prospects in a digital world and the technical advances available are immense, but many severely underestimate cyber security vulnerabilities and the

Why Cyber Security is important for small businesses Read More »