Blog

Data Privacy Day 2023 (January 28th)

Data Privacy Day 2023 (January 28th)

As we near the end of January, Data Privacy Day is looming on the horizon once again. Since 2007, Jan 28th has been a day devoted to raising awareness on protecting information online amongst businesses and users. Is it marked on your calendar? Or is this the first...

Ransomware in 2023

Ransomware in 2023

We recently ran polls on social media (links below) asking people to identify this year's largest security threats. Although there is still time to participate, the results are unlikely to change given the lead currently held. It seems that ransomware in 2023 is the...

Cyber security threats in 2023

Cyber security threats in 2023

Cyber security has featured prominently in the news headlines for several years now. Yet so many organisations still do not see it as a priority. Instead, far too many businesses only take an interest when they are required to. Raising cyber awareness is a crucial...

CRIBB in 2022 (a year in review)

CRIBB in 2022 (a year in review)

Happy New Year everybody! Here we are at the start of January and whilst we're excited about 2023, we wanted to look at CRIBB in 2022. It was an interesting and busy 12 months for the team, with new products and solutions, a new look and a return to events. Here then...

Cyber security news Dec 2022

Cyber security news Dec 2022

As month's end approaches, it is time for another collection of key updates to have emerged. Cyber security news Dec 2022 features two reports from The Hacker News. We begin with their article on a new way for attackers to bypass popular web application firewalls. We...

Cyber security strategy for life, not just Xmas

Cyber security strategy for life, not just Xmas

With Christmas now looming, shopping is sure to be high on the agenda this week. Indeed, it has been for many of us for the last few weeks. As such, online retailers have been busy refining their cyber security strategy to ensure they are ready for a higher volume of...

Data Protection and the EU

Data Protection and the EU

The General Data Protection Regulation (GDPR) was launched more than four-and-a-half years ago, and much has happened since. The UK is no longer part of Europe, which then led to the implementation of the UK GDPR. Last year, on 28 June 2021, adequacy decisions for the...

Cyber security news Nov 2022

Cyber security news Nov 2022

A new month has begun, so it is time for another look back at some updates from the security world. Cyber security news Nov 2022 includes a piece on the Medibank ransomware attack. We then move on to the UK's biggest fraud investigation, resulting in the iSpoof...

Cyber security risk assessments

Cyber security risk assessments

Every organisation faces security risks and must therefore implement robust cyber security controls. Cyber security risk assessments are used to assess those controls to ensure they are appropriate. Today then we look more closely at these important aspects of any...

What is DPO as a service?

What is DPO as a service?

Introduction The role of the DPO or Data Protection Officer is to ensure that the company processes personal data in accordance with applicable data protection rules, including Data Protection Impact Assessments (DPIA). The data concerned are those of its staff,...

Cyber security quotes to blow your mind

Cyber security quotes to blow your mind

This week we decided to list out some of our favourite cyber security quotes. Some may well 'blow your mind', whilst others may merely brighten up your day. Whatever the end result, if nothing else we hope you'll think about security in a slightly different way!...

Cyber security threats 2023

Cyber security threats 2023

In the wake of the pandemic, many people now work remotely either on a permanent or hybrid basis. As such, there has been a marked increase in security risks as companies struggle to maintain a consistent infrastructure. Cyber-criminal activity is also on the rise,...

Cyber security news Oct 2022

Cyber security news Oct 2022

It is November and time for a look back at some of the key stories to have emerged last month. Cyber security news Oct 2022 features Germany releasing then cybersecurity chief Arne Schönbohm 'over Russia ties'. Then we move onto the release of a new Google Chrome...

Penetration testing definition

Penetration testing definition

One of our core IT security products, penetration tests are incredibly useful when evaluating a computer system's level of security. We have produced articles on pen testing before but today we present you with a penetration testing definition. Definition Penetration...

Vulnerability scans

Vulnerability scans

Vulnerability scans are performed on computer systems or networks to identify potential weaknesses. They are a type of security testing that can be used to scan for both known and unknown vulnerabilities. Many organisations use them within security assessments to...

Supply chain cyber security

Supply chain cyber security

The majority of organisations rely upon suppliers to deliver products, systems and services. It is important then to have a good awareness of supply chain cyber security. Today we aim to look into this in more detail to help in that endeavour. We will also outline...

Cyber security news Sep 2022

Cyber security news Sep 2022

It's October and time once again to look back at the previous month's key headlines. Cyber security news Sep 2022 features a series of hacking incidents against well-known brands. We then cover an ICO update on organisations failing to deal with Subject Access...

International Cyber Expo 2022

International Cyber Expo 2022

The International Cyber Expo 2022 had its own dedicated hall this year in a move "driven by market demand". The team at CRIBB were delighted to be in attendance for day 1 of the show on Tuesday 27th September. Today then we focus on our experience there. The perfect...

Data Protection Officer FAQs (and answers)

Data Protection Officer FAQs (and answers)

Here are some Data Protection Officer FAQs that our team has often fielded. For those who aren't familiar with the role a DPO plays in an organisation, that is broken down for you. If you are unsure whether or not you require a DPO, that should also become clear. What...

Queen Elizabeth II: 1926 – 2022

Queen Elizabeth II: 1926 – 2022

It has been quite a week here in the UK. The death of Queen Elizabeth II is rightly commanding our sole attention. Today then, we shift the focus away from cyber security and on to a quite remarkable woman. Thank you for everything, Ma'am. 70 Years of service The...

Important IT Security policies

Important IT Security policies

Policies are an integral element within an organisation’s defence strategy. Though quite often overlooked, they inform the way cyber security threats are handled by employees. They also provide guidance on how to properly use defensive technology, whilst clearly...

Cyber security news Aug 2022

Cyber security news Aug 2022

It's that time of the month when we look back at some of the key stories to have emerged. Cyber security news Aug 2022 includes another ransomware attack against the NHS here in England. We then look at a Threat Post piece on the growth of ransomware attacks this...

Penetration testing guide

Penetration testing guide

Today we look at a crucial tool used to analyse the security of IT systems. This short penetration testing guide will advise on how to maximise your pen testing efforts. What is it? Penetration testing is a powerful tool used for gaining assurance in an organisation's...

Marketing compliance for small businesses

Marketing compliance for small businesses

We work with a lot of businesses both large and small. One question we're often ask by SMEs is how they can keep on top of marketing compliance. This can be something of a minefield but it is critical to comply with the UK GDPR and the Privacy and Electronic...

New look for CRIBB Cyber Security

New look for CRIBB Cyber Security

The eagle-eyed amongst you may have noticed a change in our website. The new look for CRIBB Cyber Security is one we have worked at for much of 2022. We have deliberately taken our time to ensure the project was done in the correct way. We have also spent time...

Cyber security news Jul 2022

Cyber security news Jul 2022

It's now August and time for a look back at recent security updates. 'Cyber security news Jul 2022' includes hackers targeting the British Army. We then turn our attention towards the BlackCat ransomware group before finishing with a look at phishing attacks in the...

Cyber security risks

Cyber security risks

The risks to your overall IT security strategy are numerous. At times, the cyber threat is greater than at any other point. Today we look at what to do if that happens and we also look at key cyber security risks. What is cyber security risk? Simply put, it is the...

Microsoft Windows 10 Updates

Microsoft Windows 10 Updates

Our cyber security experts have recently noticed a worrying trend with Microsoft Windows 10 Updates. It seems that many organisations are running out-of-date Windows 10 build versions. This is due to the fact that they have assumed automatic updates are sufficient to...

Cyber security news Jun 2022

Cyber security news Jun 2022

As June nears its end it is then time to look back at some of the stories which emerged. Cyber security news Jun 2022 features pieces from the BBC News Technology archive. There we found a piece on a new, free-of-charge, cyber security programme in Scotland. We then...