Local government cyber security challenges are broad across the UK, not least due to the decentralised approach to local government and the challenges of sharing information and approaches to online threats. Challenges and threats include both external actors and internal issues.
7 min read
4 min read
The education sector was found to be the 7th most-targeted industry in IBM’s 2020 Threat Intelligence Index and find themselves in the crosshairs of cyber criminals and nation-state attackers due to the vast amounts of personal information and research data that they hold. Whether they are looking to profit from selling stolen data, ransoms or gaining an advantage by stealing world-class research, the education sector is a target for threat actors and I'll explain how it can be better protected from cyber threats.
4 min read
Validate Your Security Investments with combined Breach and Attack Simulations (BAS) and Vulnerability Management
Before we get into the benefits of this solution and how you can validate security decision-making, it’s important to explain what exactly, breach and attack simulation, is.
1 min read
Celerity is proud to announce that we have built upon our existing Cyber Essentials accreditation and are now Cyber Essentials Plus accredited.
3 min read
How do you manage something which is etched into human personality and behaviour; the act of wanting to comply with authority and reacting to urgent matters with the utmost interest? Essentially you don’t, you engineer the environment, situations and working processes to complement these weaknesses and thus strengthen them.
2 min read
The debate of whether or not organisations should pay ransoms to cybercriminals in return for their unencrypted data has been going on for years. On one hand, as data is now the lifeblood of almost all organisations a successful ransomware attack can mean business closure. However, succumbing to the ransom is only fuelling the cybercrime economy which is now estimated to be the 3rd largest in the world. But a recent report into ransomware attacks may add weight to the notion of never paying the ransom.