<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1601576979905566&amp;ev=PageView&amp;noscript=1">
4 min read

Top Local Government Security Challenges

By Joshua Read on 21-Sep-2020 09:48:13

The risk of cyber threats to business is high, but when your stakeholders include citizens, the impact of successful breaches have far wider implications. In the first half of 2019 local councils faced 263 million cyber-attacks (Gallagher, 2020) and the Government sector was found to be the 6th most targeted sector in the IBM X -Force Threat Intelligence Index, 2020, signalling councils are very much in the cross-hairs of cyber criminals. We’ll take a look at the top cyber security challenges facing local government in an already complicated world.

Topics: Cyber Threats Cyber-Attacks Government Local Government Security Challenges public sector
3 min read

Managing phishing – Weaponising Your Workforce

By Joshua Read on 14-Jul-2020 17:25:56

How do you manage something which is etched into human personality and behaviour; the act of wanting to comply with authority and reacting to urgent matters with the utmost interest?  Essentially you don’t, you engineer the environment, situations and working processes to complement these weaknesses and thus strengthen them.

Topics: Cyber Threats Cyber Security Phishing social engineering layered approach to phishing
2 min read

Mitigating Ransomware Attacks

By David Taylor on 17-Jun-2020 12:02:50

The debate of whether or not organisations should pay ransoms to cybercriminals in return for their unencrypted data has been going on for years. On one hand, as data is now the lifeblood of almost all organisations a successful ransomware attack can mean business closure. However, succumbing to the ransom is only fuelling the cybercrime economy which is now estimated to be the 3rd largest in the world. But a recent report into ransomware attacks may add weight to the notion of never paying the ransom.

Topics: Ransomware Cyber Threats Cyber Security Phishing backup air gap backup security awareness training
1 min read

Secure with Celerity 15.05.2020

By David Taylor on 18-May-2020 13:15:09

In this week's episode of Secure with Celerity  we were joined by Celerity  Lead Cyber Security Analyst, Josh Read and  Celerity Business Development, Chris McCartney.

Topics: Cyber Threats Security Cyber Security Data Breach Cyber News Data Protection
1 min read

Secure with celerity 07.05.2020

By David Taylor on 10-May-2020 17:10:11

In this week's episode of Secure with Celerity  we were joined by Celerity Technical Atchitect - Cyber Security, Steve Laidler and  Lead Cyber Security Analyst, Josh Read.

Topics: Cyber Threats Security Cyber Security Data Breach Cyber News Data Protection
3 min read

Adopting A Layered Approach To Phishing

By Steven Laidler on 30-Oct-2019 17:20:51

In 2019, cyber criminals are finding smarter and more integrated ways to target companies and individuals.

Topics: Cyber Threats Cyber Security Cyber-Attacks Phishing layered approach to security layered approach to phishing