ADVISORY NOTE 05/2023 – UK-US Data Bridge

ADVISORY NOTE 05/2023 – UK-US Data Bridge

BACKGROUND The UK’s Department of Science, Innovation and Technology (DSIT) recently announced that as from 12th October 2023, new UK legislation, namely the Data Protection (Adequacy) (United States of America) Regulations 2023 (SI 2023/1028) will allow businesses in the UK to transfer personal data to US organisations certified to the “UK Extension to the EU-US Data … Read more

INSIGHT: How to Recognise a Phishing Attack

Introduction One of the most frequent cyber-attacks is phishing, which can cause financial loss, identity theft, and unauthorised access to private information. Cybercriminals use sophisticated ways to pose as a reliable business and trick people into disclosing personal information, such as usernames, passwords, or credit card details. To protect your digital life, it’s essential to … Read more

INSIGHT: The Importance of Cyber Security and Managing Risk

The operations of any modern organisation depend heavily on cyber security. The potential for damage caused by cybercrime grows dramatically as data and information management become more intricate and linked. This means organisations must take the initiative to create ways to mitigate their cyber risk. An important strategy is achieving cyber maturity, which involves understanding … Read more

INSIGHT: The Different Types of Penetration Testing (Part 2)

In Part 1, we examined the various types of (technical) penetration tests that can be used to gain assurance regarding your organisation’s vulnerability to a cyber-attack or accidental breaches. In short, a penetration test is designed to measure the level of technical risk arising from the software and the efficiency of your current security controls. … Read more

INSIGHT: The Different Types of Penetration Testing (Part 1) 

In a recent edition of “Insights”, we discussed the importance of regularly conducting a penetration test on your systems – as a method for gaining a measure of assurance in respect of your organisation’s vulnerability assessment and management processes. Much like a financial audit, a penetration test is designed to measure the level of technical … Read more

INSIGHT: Why Staff Awareness of Cyber Security is Important

Why Staff Awareness of Cyber Security is Important Cyber security is an ever-evolving and increasingly complex issue that organisations must take seriously. The emergence of new technologies, such as the Internet of Things (IoT) and AI, has opened up a range of new threats. One significant cyber risk is human error – the weakest link … Read more

INSIGHT: Social Engineering: What is it, and how can we beat it?

The term “Social Engineering” is today synonymous with the world of cybercrime, internet-based fraud and (not by accident) sits at the core of the vast majority of cyber-attacks. Research consistently confirms that 80-90% of successful cyberattacks originate with a social engineering activity, usually a phishing email. Proofpoint research in 2022 suggested that: Social engineering is … Read more

INSIGHT: The Benefits of Partnerships with MooreClearComm

As technology continues to evolve and cyber threats become greater and more sophisticated, it’s important for organisations of all sizes to ensure their networks are secure. That’s why as an IT company partnering with Moore ClearComm offers your clients additional comprehensive cyber security solutions. At Moore ClearComm we know that no two businesses are the … Read more

INSIGHT: The Importance of Annual Penetration Testing

In a world increasingly dependent on technology, cyber security has become an essential requirement to protect our data from malicious actors and criminals. To stay one step ahead of potential threats, it is important to regularly conduct penetration tests – also known as pen tests – on our systems. These are simulated cyber-attacks performed against … Read more

INSIGHT: What Is Phishing

Phishing is a type of cyber attack that involves an attacker attempting to trick victims into revealing valuable financial or personal information. Through various methods such as sending emails, text messages, or even pop-up windows, attackers can convince someone to enter their sensitive details into a malicious website. It is important for individuals to understand … Read more