Blog

Cyber security in 2021 (An end of year review)

Cyber security in 2021 (An end of year review)

As we stride into the new year, it would be remiss not to turn back and assess the previous 12 months. Cyber security in 2021 was once again a 'hot ticket item', with numerous high-profile security incidents and developments. Today we ask Patrick Carolan to take a...

Cyber security news Dec 2021

Cyber security news Dec 2021

In the first of a CRIBB blog double-bill this week*, we look back at cyber security news Dec 2021. The month began with a cyber-attack against Spar shops and continued with hackers looking to exploit the Log4j vulnerability. Finally, the BBC revealed a new...

Ransomware in education

Ransomware in education

There have been numerous high-profile cases of ransomware in the mainstream news in recent years. Going after big corporations would seem to be at the top of cyber-criminals' wish lists. However, schools and colleges are increasingly finding themselves being targeted....

Cyber Essentials technical controls update

Cyber Essentials technical controls update

In January 2022, the NCSC is introducing the largest Cyber Essentials (CE) technical controls update since it was first launched in 2014. Today we look at what is changing to see what it might then mean for you moving forwards. The new year will see the introduction...

Cyber Security in healthcare

Cyber Security in healthcare

We are part of theICEway along with eTestware and ICE. Together, we deliver a complete digital solution for clients in sectors including healthcare. Our group of IT brands are all either celebrating or approaching significant milestones. CRIBB turned 5 in November...

Cyber security news Nov 2021

Cyber security news Nov 2021

A mere 2 weeks ago we rounded-up our pick of security updates for October - you can read that piece here. We considered waiting a while longer to reveal our choices from this month. Then we opted to do it sooner rather than later as there is a lot to get through in...

The evolution of cyber security

The evolution of cyber security

This week CRIBB Cyber Security is 5 and to celebrate, we're looking at the evolution of cyber security. The world as we now know it is far different to the one we experienced back in 2016. As we shall see, 5 years ago cyber-criminals were becoming more targeted and...

Cyber security news Oct 2021

Cyber security news Oct 2021

We're now past the halfway mark in November and so then it is time for one of our regular features: Cyber security news Oct 2021. Today we'll look at the UK National Cyber Force and phishing attempts against YouTube users. Then we'll hear about another high-profile...

Who needs to register with ICO?

Who needs to register with ICO?

Who needs to register with ICO? It is a question that has caused some confusion. Many believe that it is only data controllers that need to. However, as we shall see, data processors must also register. What is a data controller? Typically, if you decide 'why' and...

Cyber security news Sep 2021

Cyber security news Sep 2021

Perhaps a little later than usual, it is time for us to take a look at cyber security news Sep 2021. Last month yielded yet more cyber criminal activity and IoT attacks caused particular concern following the release of a report on their growth during Q1 & Q2....

Ransomware in Travel

Ransomware in Travel

In last week's blog we looked at the current rules on cookies*. We did this in response to an announcement by Profit about a potential phishing scam against travel companies. Today we look more closely at Profit themselves and at this scam, as well as ransomware in...

The rules on cookies and similar technologies

The rules on cookies and similar technologies

For many years CRIBB Cyber Security has helped clients in a variety of sectors including travel. Recently, our friends at Profit shared news of a potential phishing / ransomware attempt against travel companies. It seems that some have received messages suggesting...

Pentesting and vulnerability scans

Pentesting and vulnerability scans

One aspect of our cyber security solutions is a detection service offering, which allows CRIBB to help with pentesting and vulnerability scans. These are often mistaken as being the same and many organisations then opt for the wrong solution. Today we take a look at...

Cyber security certificates from CRIBB

Cyber security certificates from CRIBB

Our regular readers will know all about the importance of cyber security certification, especially in this day and age. Cyber security certificates are powerful trust symbols and potential clients look for them now more than ever before. They are only awarded when...

Cyber security news Aug 2021

Cyber security news Aug 2021

It is the end of the month and therefore time for a cyber security news Aug 2021 round-up. We take a look at a first for the Ministry of Defence. There was yet another high-profile hacking incident and a hike in cyber security pay to read all about. You can also read...

Tips to stay safe online

Tips to stay safe online

At CRIBB we pride ourselves on helping organisations to achieve cyber-resilience. Through certifications, data protection officer services and more, our cyber security experts are always ready to help. But what about security for individuals? Here are some tips to...

ISO27001 Certification

ISO27001 Certification

CRIBB Cyber Security is an official certification body. We are backed by the UK government and qualified to help with Cyber Essentials, IASME Governance and more. Recently we added ISO27001 Certification to our range of security services. Today we look more closely at...

Action Fraud to be scrapped

Action Fraud to be scrapped

Back in July, reports emerged that action fraud was to be scrapped after a Times expose. Last week, however, City of London Police - the national policing lead for fraud - revealed that it was always in line to be replaced. Today we look at exactly what role the...

Cyber security awareness training

Cyber security awareness training

Last month, we published several articles on cyber security awareness. The first discussed the importance of being cyber aware. The second then gave tips on how to encourage and embrace it within the workplace. Today we go a step further by looking at cyber security...

Cyber security news Jul 2021

Cyber security news Jul 2021

It is time for another round-up of key stories from the world of cyber security news, Jul 2021. Cyber-attacks continue apace, with many attributing the blame for certain high-level incidents to China. They have now hit back in what is shaping up to be quite a story....

Cyber security awareness tips

Cyber security awareness tips

We recently had an article published on the importance of cyber security awareness. In that piece, we provided best practices and recommended that you create a culture of cyber awareness. With so many cyber-crimes and data breaches occurring nowadays, this is becoming...

EOL and outdated OS effects on compliance

EOL and outdated OS effects on compliance

EOL, aka 'End of Life', is a fairly common IT term used when a product is at the end of its lifecycle. Users no longer receive updates and therefore security issues can arise. You can also expect poor performance and reliability as legacy apps continue to run but...

Importance of cyber security awareness

Importance of cyber security awareness

Avid readers of our blog will have seen our cyber security news round-ups dominated this year by incidents including ransomware. Indeed, major incidents are occurring on a weekly basis, with a rise in phishing, data breaches and more. Those readers will have little...

Cyber security news Jun 2021

Cyber security news Jun 2021

As the month draws to a close, we look back at some key stories in our regular feature: Cyber security news (Jun 2021). Unfortunately, it has been another fertile period for cyber-criminals. Indeed, it seems rare now in the security world for a day to pass without...

A handy guide to phishing

A handy guide to phishing

This week we are delighted to present you with a handy guide to phishing. The majority of data breaches are due to social engineering and phishing, so it makes sense then to ensure you embrace best practices. It would be virtually impossible to cover everything in one...