<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1601576979905566&amp;ev=PageView&amp;noscript=1">

Validate Your Security Investments with combined Breach and Attack Simulations (BAS) and Vulnerability Management

Before we get into the benefits of this solution and how you can validate security decision-making, it’s important to explain what exactly, breach and attack simulation, is.

Read More

Tags: Cyber Security, vulnerability management, Breach and attack simulation, BAS, cyber threat insight

Posted by David Taylor on 01-Dec-2020 17:13:18

Celerity achieves cyber essentials plus

Celerity is proud to announce that we have built upon our existing Cyber Essentials accreditation and are now Cyber Essentials Plus accredited.

Read More

Tags: Security, Cyber Security, Celerity News, Cyber Essentials Plus

Posted by David Taylor on 14-Oct-2020 14:58:20

Managing phishing – Weaponising Your Workforce

How do you manage something which is etched into human personality and behaviour; the act of wanting to comply with authority and reacting to urgent matters with the utmost interest?  Essentially you don’t, you engineer the environment, situations and working processes to complement these weaknesses and thus strengthen them.

Read More

Tags: Cyber Threats, Cyber Security, Phishing, social engineering

Posted by Joshua Read on 14-Jul-2020 17:25:56

Mitigating Ransomware Attacks

Ransomware Attacks In 2020


The debate of whether or not organisations should pay ransoms to cybercriminals in return for their unencrypted data has been going on for years. On one hand, as data is now the lifeblood of almost all organisations a successful ransomware attack can mean business closure. However, succumbing to the ransom is only fuelling the cybercrime economy which is now estimated to be the 3rd largest in the world. But a recent report into ransomware attacks may add weight to the notion of never paying the ransom.

Read More

Tags: Cyber Threats, Cyber Security, Phishing, backup, air gap backup, security awareness training

Posted by David Taylor on 17-Jun-2020 12:02:50

Secure with Celerity 15.05.2020

In this week's episode of Secure with Celerity  we were joined by Celerity  Lead Cyber Security Analyst, Josh Read and  Celerity Business Development, Chris McCartney.

Read More

Tags: Cyber Threats, Security, Cyber Security, Data Breach, Cyber News, Data Protection

Posted by David Taylor on 18-May-2020 13:15:09

Posts by Tag

See all