
Vulnerability scans
Vulnerability scans are performed on computer systems or networks to identify potential weaknesses. They are a type of security testing that can be used to scan for both known and unknown vulnerabilities. Many organisations use them within security assessments to...

Supply chain cyber security
The majority of organisations rely upon suppliers to deliver products, systems and services. It is important then to have a good awareness of supply chain cyber security. Today we aim to look into this in more detail to help in that endeavour. We will also outline...

Cyber security news Sep 2022
It's October and time once again to look back at the previous month's key headlines. Cyber security news Sep 2022 features a series of hacking incidents against well-known brands. We then cover an ICO update on organisations failing to deal with Subject Access...

International Cyber Expo 2022
The International Cyber Expo 2022 had its own dedicated hall this year in a move "driven by market demand". The team at CRIBB were delighted to be in attendance for day 1 of the show on Tuesday 27th September. Today then we focus on our experience there. The perfect...

Data Protection Officer FAQs (and answers)
Here are some Data Protection Officer FAQs that our team has often fielded. For those who aren't familiar with the role a DPO plays in an organisation, that is broken down for you. If you are unsure whether or not you require a DPO, that should also become clear. What...

Queen Elizabeth II: 1926 – 2022
It has been quite a week here in the UK. The death of Queen Elizabeth II is rightly commanding our sole attention. Today then, we shift the focus away from cyber security and on to a quite remarkable woman. Thank you for everything, Ma'am. 70 Years of service The...

Important IT Security policies
Policies are an integral element within an organisation’s defence strategy. Though quite often overlooked, they inform the way cyber security threats are handled by employees. They also provide guidance on how to properly use defensive technology, whilst clearly...

Cyber security news Aug 2022
It's that time of the month when we look back at some of the key stories to have emerged. Cyber security news Aug 2022 includes another ransomware attack against the NHS here in England. We then look at a Threat Post piece on the growth of ransomware attacks this...

Penetration testing guide
Today we look at a crucial tool used to analyse the security of IT systems. This short penetration testing guide will advise on how to maximise your pen testing efforts. What is it? Penetration testing is a powerful tool used for gaining assurance in an organisation's...

Marketing compliance for small businesses
We work with a lot of businesses both large and small. One question we're often ask by SMEs is how they can keep on top of marketing compliance. This can be something of a minefield but it is critical to comply with the UK GDPR and the Privacy and Electronic...

New look for CRIBB Cyber Security
The eagle-eyed amongst you may have noticed a change in our website. The new look for CRIBB Cyber Security is one we have worked at for much of 2022. We have deliberately taken our time to ensure the project was done in the correct way. We have also spent time...

Cyber security news Jul 2022
It's now August and time for a look back at recent security updates. 'Cyber security news Jul 2022' includes hackers targeting the British Army. We then turn our attention towards the BlackCat ransomware group before finishing with a look at phishing attacks in the...

Cyber security risks
The risks to your overall IT security strategy are numerous. At times, the cyber threat is greater than at any other point. Today we look at what to do if that happens and we also look at key cyber security risks. What is cyber security risk? Simply put, it is the...

What is Cybersecurity and why is it important ?
Introduction Cybersecurity or computer security is the way people reduce the risk of online attacks. It improves the protection of systems (smartphones, laptops, tablets, and computers) and computer networks. The aim is to protect them against information gathering,...

Microsoft Windows 10 Updates
Our cyber security experts have recently noticed a worrying trend with Microsoft Windows 10 Updates. It seems that many organisations are running out-of-date Windows 10 build versions. This is due to the fact that they have assumed automatic updates are sufficient to...

Cyber security news Jun 2022
As June nears its end it is then time to look back at some of the stories which emerged. Cyber security news Jun 2022 features pieces from the BBC News Technology archive. There we found a piece on a new, free-of-charge, cyber security programme in Scotland. We then...

The history and evolution of the Maritime Industry
Introduction to the history of the Maritime Industry Cribb has been working with companies in the maritime sector for many years, and this is an area that interests us. That's why we want you to discover it. The history and evolution of the maritime industry are long....

Technical Cyber security
Technical Cyber security is essentially another name for cyber security. Both terms describe the practice of defending IT infrastructure, hardware and data from malicious attacks. Some also refer to this as 'information technology security'. Today we'll look at this...

Cybersecurity solutions for the maritime industry
Introduction Cybersecurity plays a big role in the maritime industry and provides many solutions, especially with the evolution of technology. Let's take a look at what the maritime industry is and its history. This industry includes not only the production of ships,...

Cyber security news May 2022
As we find ourselves at the end of the month, it is time for cyber security news May 2022. Here we look at an NCSC warning in the UK over cyber-criminals targeting apps to cause harm to connected devices. Then we focus on a data breach in Cornwall involving the...

Do I need a DPO (Data Protection Officer)?
Do I need a DPO? It is a question we often field and one that many organisations are giving more consideration to. Today then, we pose some initial questions and answers that will hopefully answer this for you. Everything you will read is in line with the IASME...

Cyber awareness: CRIBB’s mission in 2022
It is our mission this year to raise cyber awareness both in the UK and around the world. What better time to shout about that than on the eve of World Telecommunication and Information Society Day (WTISD)? May 17th marks this occasion, which has been celebrated since...

ICE is 15 years old (and our team are very proud!)
It's official: ICE is 15 years old! To celebrate reaching this milestone, the team at theICEway submitted some very kind messages. Staff from the past and present were asked to sum up their ICE experience to date and you can read some of them below. Everybody at CRIBB...

CRIBB Cyber Security in 2022: Our new look
You may have noticed that our website homepage has changed. This is all part of our strategy for CRIBB Cyber Security in 2022. The site will be fully adopting our new look and feel and we'll be providing tailored cyber security packages that will help organisations to...

Cyber security news Apr 2022
As we power through the last week of the month, it is time for cyber security news Apr 2022. Over the last few weeks we saw RaidForums taken down, then the US linked North Korea to a cryptocurrency heist. Just last week, No. 10 Downing Street was infected with spyware...

Cyber Security Ready from CRIBB (CRIBB CSR)
Are you 'cyber security ready'? We help organisations around the world and in the UK to answer that question in the positive. Formed in 2016, CRIBB Cyber Security can help you with certifications, detection & defence and safeguarding. This year, we have developed...

Security by design IT Solutions (ICE in 2022)
ICE turns 15 next month and to celebrate, we're looking at Security by design IT Solutions. A staple of theICEway's offering, we are proud to enable our ecosystem's teams to embrace cyber security from the word go. Whenever involved in a technology project,...

Maritime cybersecurity
A few weeks ago we ran a piece on IASME's new maritime cybersecurity standard. Today then we continue to look at security for the seas, with some top tips for good measure! IASME's scheme is essentially an enhanced version of our own CMCA solution for cruise. We're...

Cyber security news Mar 2022
March is drawing to a close and so it is time for cyber security news Mar 2022. We begin with yet another cyber security incident, this time against video game developer Ubisoft. Then we touch upon Google's efforts to fix another zero-day flaw. Finally, we look at the...

Bitdefender: Cyber security for small to medium businesses
In the wake of the terrible situation in Ukraine, many are now having doubts over using anti-virus software from Kaspersky. There are many alternatives to consider if you find yourself in that situation. Today then we look at those and at Bitdefender, with whom we...