Cyber News & Insights
Nearly 90,000 Disabled People are ‘Missing’ from the Tech Industry, According to the BCS
There are 88,000 people with hidden and visible disabilities 'missing' from the tech workforce, according to the professional body for IT. People with disabilities make up 15% of the UK workforce but account for only 11% of the technology specialists, analysis by BCS,...
Delivery Scams on the Rise: Here’s How to Protect Yourself Online
Three quarters of people (74%) have been targeted by scams this year, with delivery scams being the most common Generation Logistics, awareness campaign for logistics careers, partners with Cyber Security Awareness & Tech Professional, Lisa Ventura MBE, to...
LinkedIn Cyber Attacks: 7 Expert Tips to Protect Your Account and How to Respond to Hackers
In recent weeks, a wave of cyber attacks has targeted LinkedIn users. Perpetuated on a global scale, this unsettling surge in targeted attacks has led to calls for heightened security measures to safeguard accounts. Users have fallen victim to account takeovers, with...
Countering The Rise of AI Criminals by Amit Yossi Siva Levi, Principal Researcher at Forter
Written by Amit Yossi Siva Levi, Principal Researcher at Forter. (Previously CTO and co-founder of bot detection company Immue). As generative AI tools continue to expand, new doors are being opened for fraudsters to exploit weaknesses. Have you experimented with...
Founder’s Blog: Are Women in Cyber Still Scared to Speak Up?
Yesterday I ran #InfosecLunchHour and invited my friend Fallon (not her real name) to come along to it. She is neurodiverse like me, had a career break for a number of years to look after her 2 children who are also neurodiverse, and is looking at transitioning into a...
A Short Guide to Cyber Essentials and Why Your Organisation Needs It
Cyber-attacks are rising exponentially amongst businesses of all sizes, so protecting your organisation against cyber-criminals has never been more important. To get started, all businesses whatever their size should look at implementing Cyber Essentials. But what is...

