Blog

Vulnerability scans

Vulnerability scans

Vulnerability scans are performed on computer systems or networks to identify potential weaknesses. They are a type of security testing that can be used to scan for both known and unknown vulnerabilities. Many organisations use them within security assessments to...

Supply chain cyber security

Supply chain cyber security

The majority of organisations rely upon suppliers to deliver products, systems and services. It is important then to have a good awareness of supply chain cyber security. Today we aim to look into this in more detail to help in that endeavour. We will also outline...

Cyber security news Sep 2022

Cyber security news Sep 2022

It's October and time once again to look back at the previous month's key headlines. Cyber security news Sep 2022 features a series of hacking incidents against well-known brands. We then cover an ICO update on organisations failing to deal with Subject Access...

International Cyber Expo 2022

International Cyber Expo 2022

The International Cyber Expo 2022 had its own dedicated hall this year in a move "driven by market demand". The team at CRIBB were delighted to be in attendance for day 1 of the show on Tuesday 27th September. Today then we focus on our experience there. The perfect...

Data Protection Officer FAQs (and answers)

Data Protection Officer FAQs (and answers)

Here are some Data Protection Officer FAQs that our team has often fielded. For those who aren't familiar with the role a DPO plays in an organisation, that is broken down for you. If you are unsure whether or not you require a DPO, that should also become clear. What...

Queen Elizabeth II: 1926 – 2022

Queen Elizabeth II: 1926 – 2022

It has been quite a week here in the UK. The death of Queen Elizabeth II is rightly commanding our sole attention. Today then, we shift the focus away from cyber security and on to a quite remarkable woman. Thank you for everything, Ma'am. 70 Years of service The...

Important IT Security policies

Important IT Security policies

Policies are an integral element within an organisation’s defence strategy. Though quite often overlooked, they inform the way cyber security threats are handled by employees. They also provide guidance on how to properly use defensive technology, whilst clearly...

Cyber security news Aug 2022

Cyber security news Aug 2022

It's that time of the month when we look back at some of the key stories to have emerged. Cyber security news Aug 2022 includes another ransomware attack against the NHS here in England. We then look at a Threat Post piece on the growth of ransomware attacks this...

Penetration testing guide

Penetration testing guide

Today we look at a crucial tool used to analyse the security of IT systems. This short penetration testing guide will advise on how to maximise your pen testing efforts. What is it? Penetration testing is a powerful tool used for gaining assurance in an organisation's...

Marketing compliance for small businesses

Marketing compliance for small businesses

We work with a lot of businesses both large and small. One question we're often ask by SMEs is how they can keep on top of marketing compliance. This can be something of a minefield but it is critical to comply with the UK GDPR and the Privacy and Electronic...

New look for CRIBB Cyber Security

New look for CRIBB Cyber Security

The eagle-eyed amongst you may have noticed a change in our website. The new look for CRIBB Cyber Security is one we have worked at for much of 2022. We have deliberately taken our time to ensure the project was done in the correct way. We have also spent time...

Cyber security news Jul 2022

Cyber security news Jul 2022

It's now August and time for a look back at recent security updates. 'Cyber security news Jul 2022' includes hackers targeting the British Army. We then turn our attention towards the BlackCat ransomware group before finishing with a look at phishing attacks in the...

Cyber security risks

Cyber security risks

The risks to your overall IT security strategy are numerous. At times, the cyber threat is greater than at any other point. Today we look at what to do if that happens and we also look at key cyber security risks. What is cyber security risk? Simply put, it is the...

Microsoft Windows 10 Updates

Microsoft Windows 10 Updates

Our cyber security experts have recently noticed a worrying trend with Microsoft Windows 10 Updates. It seems that many organisations are running out-of-date Windows 10 build versions. This is due to the fact that they have assumed automatic updates are sufficient to...

Cyber security news Jun 2022

Cyber security news Jun 2022

As June nears its end it is then time to look back at some of the stories which emerged. Cyber security news Jun 2022 features pieces from the BBC News Technology archive. There we found a piece on a new, free-of-charge, cyber security programme in Scotland. We then...

Technical Cyber security

Technical Cyber security

Technical Cyber security is essentially another name for cyber security. Both terms describe the practice of defending IT infrastructure, hardware and data from malicious attacks. Some also refer to this as 'information technology security'. Today we'll look at this...

Cyber security news May 2022

Cyber security news May 2022

As we find ourselves at the end of the month, it is time for cyber security news May 2022. Here we look at an NCSC warning in the UK over cyber-criminals targeting apps to cause harm to connected devices. Then we focus on a data breach in Cornwall involving the...

Do I need a DPO (Data Protection Officer)?

Do I need a DPO (Data Protection Officer)?

Do I need a DPO? It is a question we often field and one that many organisations are giving more consideration to. Today then, we pose some initial questions and answers that will hopefully answer this for you. Everything you will read is in line with the IASME...

Cyber awareness: CRIBB’s mission in 2022

Cyber awareness: CRIBB’s mission in 2022

It is our mission this year to raise cyber awareness both in the UK and around the world. What better time to shout about that than on the eve of World Telecommunication and Information Society Day (WTISD)? May 17th marks this occasion, which has been celebrated since...

CRIBB Cyber Security in 2022: Our new look

CRIBB Cyber Security in 2022: Our new look

You may have noticed that our website homepage has changed. This is all part of our strategy for CRIBB Cyber Security in 2022. The site will be fully adopting our new look and feel and we'll be providing tailored cyber security packages that will help organisations to...

Cyber security news Apr 2022

Cyber security news Apr 2022

As we power through the last week of the month, it is time for cyber security news Apr 2022. Over the last few weeks we saw RaidForums taken down, then the US linked North Korea to a cryptocurrency heist. Just last week, No. 10 Downing Street was infected with spyware...

Cyber Security Ready from CRIBB (CRIBB CSR)

Cyber Security Ready from CRIBB (CRIBB CSR)

Are you 'cyber security ready'? We help organisations around the world and in the UK to answer that question in the positive. Formed in 2016, CRIBB Cyber Security can help you with certifications, detection & defence and safeguarding. This year, we have developed...

Security by design IT Solutions (ICE in 2022)

Security by design IT Solutions (ICE in 2022)

ICE turns 15 next month and to celebrate, we're looking at Security by design IT Solutions. A staple of theICEway's offering, we are proud to enable our ecosystem's teams to embrace cyber security from the word go. Whenever involved in a technology project,...

Maritime cybersecurity

Maritime cybersecurity

A few weeks ago we ran a piece on IASME's new maritime cybersecurity standard. Today then we continue to look at security for the seas, with some top tips for good measure! IASME's scheme is essentially an enhanced version of our own CMCA solution for cruise. We're...

Cyber security news Mar 2022

Cyber security news Mar 2022

March is drawing to a close and so it is time for cyber security news Mar 2022. We begin with yet another cyber security incident, this time against video game developer Ubisoft. Then we touch upon Google's efforts to fix another zero-day flaw. Finally, we look at the...