Cyber Insights
One Weak Password: How Cyber Criminals Are Destroying British Businesses
BBC Panorama Exposes the Devastating Reality of Ransomware Attacks by Lisa Ventura MBE FCIIS, Chief Executive and Founder of Cyber Security Unity A shocking new BBC Panorama investigation reveals how one weak password brought down KNP – previously known as Knights of...
#InfosecLunchHour Update From Lisa Ventura MBE FCIIS
I've been running a monthly virtual networking meet up on Zoom for a few years now called #InfosecLunchHour, and for the next meet up on Wednesday 6 August 2025 at 12.30pm BST, we're going to do something a bit different ☺️ Rather than decide on a topic/theme for the...
Looking Below the Surface of Your Business When Identifying Cyber Security Risks
Regardless of the industry or size of your business, it's likely that your organization is contending with a range of digital threats. While many of these risks may already be under active surveillance and management, hidden vulnerabilities can often persist beneath...
A Short Guide to Cyber Essentials and Why Your Organisation Needs It
Cyber-attacks are rising exponentially amongst businesses of all sizes, so protecting your organisation against cyber-criminals has never been more important. To get started, all businesses whatever their size should look at implementing Cyber Essentials. But what is...
Guest Blog: Commentary on the Colonial Pipeline Breach by John Rouffas
The Colonial Pipeline ransomware attack is front page news across every cyber security outlet. There are many that have commented on the breach itself and the impact of that breach which is felt not just in the United States through lack of fuel supply, but a...
How Does A Network Scan Tool Work?
Just like basic technology, internal networks are a part and parcel of everyday work. Be it your start up or an established business, you need a secure network that can support the sharing of files and other forms of data across desks within your office. Any form of...

