
Zero trust security: Why it is important
Zero trust security is important because it represents a shift in security strategy. It moves from one that focuses on securing the perimeter to one that focuses on securing data and access to that data. Here we look at this in more detail. We also offer information...

Social engineering in cyber security
Last week we looked at cyber security for the Internet of Things (IoT). We asked how secure smart devices were, pointing out what users can do to mitigate the potential risks involved. Smart phones, for example, offer protection against malware but are not designed to...

IoT cyber security: How secure are smart devices?
IoT - aka 'The Internet of Things' - is a network of physical objects and smart devices which are embedded with sensors, software and connectivity. These devices collect and exchange data over the internet, which in turn means that IoT cyber security is vitally...

Cyber security news Feb 2023
It is the last day of the month and that can mean only one thing... It is time for cyber security news Feb 2023! For this latest round-up, we turn to The Hacker News. They are described as "the leading and go-to source for timely and relevant breaking news from the...

VR Headsets – What you need to know
Technology is redefining our view of reality. Recent advances in VR, AR and AI have begun to change how we live and work. From online workspaces to gaming, social media and healthcare, new virtual worlds are being formed. Meta (formerly known as Facebook) has made...

Penetration testing FAQs (updated)
CRIBB is proud to deliver cyber security services and solutions for sectors including healthcare. In this highly-regulated industry, it is vital for organisations to be compliant and so they are required to engage in penetration testing. This is also true of many...

Safer Internet Day 2023
Today is officially 'Safer Internet Day 2023', and the UK Safer Internet Centre has organised a series of celebrations. They have also encouraged thousands of organisations to "promote the safe, responsible and positive use of digital technology for children and young...

Cyber security news Jan 2023
Is it really the end of another month? Cyber security news Jan 2023 takes a look back at some of the top security-related stories from the past 4 weeks. We begin with a BBC article on schools in the UK being targeted by hackers. Then we move on to OpenAI's ChatGPT,...

Data Privacy Day 2023 (January 28th)
As we near the end of January, Data Privacy Day is looming on the horizon once again. Since 2007, Jan 28th has been a day devoted to raising awareness on protecting information online amongst businesses and users. Is it marked on your calendar? Or is this the first...

Ransomware in 2023
We recently ran polls on social media (links below) asking people to identify this year's largest security threats. Although there is still time to participate, the results are unlikely to change given the lead currently held. It seems that ransomware in 2023 is the...

Cyber security threats in 2023
Cyber security has featured prominently in the news headlines for several years now. Yet so many organisations still do not see it as a priority. Instead, far too many businesses only take an interest when they are required to. Raising cyber awareness is a crucial...

CRIBB in 2022 (a year in review)
Happy New Year everybody! Here we are at the start of January and whilst we're excited about 2023, we wanted to look at CRIBB in 2022. It was an interesting and busy 12 months for the team, with new products and solutions, a new look and a return to events. Here then...

Cyber security news Dec 2022
As month's end approaches, it is time for another collection of key updates to have emerged. Cyber security news Dec 2022 features two reports from The Hacker News. We begin with their article on a new way for attackers to bypass popular web application firewalls. We...

Cyber security strategy for life, not just Xmas
With Christmas now looming, shopping is sure to be high on the agenda this week. Indeed, it has been for many of us for the last few weeks. As such, online retailers have been busy refining their cyber security strategy to ensure they are ready for a higher volume of...

Data Protection and the EU
The General Data Protection Regulation (GDPR) was launched more than four-and-a-half years ago, and much has happened since. The UK is no longer part of Europe, which then led to the implementation of the UK GDPR. Last year, on 28 June 2021, adequacy decisions for the...

Cyber security news Nov 2022
A new month has begun, so it is time for another look back at some updates from the security world. Cyber security news Nov 2022 includes a piece on the Medibank ransomware attack. We then move on to the UK's biggest fraud investigation, resulting in the iSpoof...

Cyber security risk assessments
Every organisation faces security risks and must therefore implement robust cyber security controls. Cyber security risk assessments are used to assess those controls to ensure they are appropriate. Today then we look more closely at these important aspects of any...

What is DPO as a service?
Introduction The role of the DPO or Data Protection Officer is to ensure that the company processes personal data in accordance with applicable data protection rules, including Data Protection Impact Assessments (DPIA). The data concerned are those of its staff,...

Cyber security quotes to blow your mind
This week we decided to list out some of our favourite cyber security quotes. Some may well 'blow your mind', whilst others may merely brighten up your day. Whatever the end result, if nothing else we hope you'll think about security in a slightly different way!...

Cyber security threats 2023
In the wake of the pandemic, many people now work remotely either on a permanent or hybrid basis. As such, there has been a marked increase in security risks as companies struggle to maintain a consistent infrastructure. Cyber-criminal activity is also on the rise,...

Cyber security news Oct 2022
It is November and time for a look back at some of the key stories to have emerged last month. Cyber security news Oct 2022 features Germany releasing then cybersecurity chief Arne Schönbohm 'over Russia ties'. Then we move onto the release of a new Google Chrome...

Penetration testing definition
One of our core IT security products, penetration tests are incredibly useful when evaluating a computer system's level of security. We have produced articles on pen testing before but today we present you with a penetration testing definition. Definition Penetration...

Vulnerability scans
Vulnerability scans are performed on computer systems or networks to identify potential weaknesses. They are a type of security testing that can be used to scan for both known and unknown vulnerabilities. Many organisations use them within security assessments to...

Supply chain cyber security
The majority of organisations rely upon suppliers to deliver products, systems and services. It is important then to have a good awareness of supply chain cyber security. Today we aim to look into this in more detail to help in that endeavour. We will also outline...

Cyber security news Sep 2022
It's October and time once again to look back at the previous month's key headlines. Cyber security news Sep 2022 features a series of hacking incidents against well-known brands. We then cover an ICO update on organisations failing to deal with Subject Access...

International Cyber Expo 2022
The International Cyber Expo 2022 had its own dedicated hall this year in a move "driven by market demand". The team at CRIBB were delighted to be in attendance for day 1 of the show on Tuesday 27th September. Today then we focus on our experience there. The perfect...

Data Protection Officer FAQs (and answers)
Here are some Data Protection Officer FAQs that our team has often fielded. For those who aren't familiar with the role a DPO plays in an organisation, that is broken down for you. If you are unsure whether or not you require a DPO, that should also become clear. What...

Queen Elizabeth II: 1926 – 2022
It has been quite a week here in the UK. The death of Queen Elizabeth II is rightly commanding our sole attention. Today then, we shift the focus away from cyber security and on to a quite remarkable woman. Thank you for everything, Ma'am. 70 Years of service The...

Important IT Security policies
Policies are an integral element within an organisation’s defence strategy. Though quite often overlooked, they inform the way cyber security threats are handled by employees. They also provide guidance on how to properly use defensive technology, whilst clearly...

Cyber security news Aug 2022
It's that time of the month when we look back at some of the key stories to have emerged. Cyber security news Aug 2022 includes another ransomware attack against the NHS here in England. We then look at a Threat Post piece on the growth of ransomware attacks this...