Proactive Ransomware Protection! – Auditing OneDrive with Elasticsearch and Kibana

For those of you who haven’t followed our series on ransomware, previously we discussed how you could use OneDrive to backup and version control all that decentralised data users typically store on their laptops and desktops, and you can catch up here.  For large scale enterprise, this can be an important safeguard to prevent data […]

Ransomware – Recover better, faster!

In our last two articles on Ransomware we discussed what it was, the impact it can have on your business and some quick steps you can take to ready your business for a Ransomware attack.  Hopefully, these quick wins were of value and you are already much better prepared to fend off your next Ransomware […]

Be Ransomware Ready!

Are users ready? One of the most common infection vectors is via the end-user and phishing/vishing campaigns are getting more sophisticated every year.  You can utilise free training material from the NCSC to train your users and raise awareness.  What’s great about this service is it includes a user quiz and can be loaded into […]

Ransomware, What is it?

Ransomware is one of the most prevalent variants of cyber-attack, often delivering more impact and disruption to the victim than many other attacks. Ransomware has featured in the majority of headline-grabbing cyber-attacks, such as the recent attack against Garmin which brought them days of user-impacting downtime, a week of recovery and a capital loss of […]

InfoSec Colour Team Structure – The White Team

The White Team are a high-level team with non-technical reasonabilities.  Generally, small in size, they are made from a mixture of senior technical members, management and business sponsors.  This White team primary reasonabilities are creating and communicating cybersecurity strategies, KPI and SLA’s, governance risk assessments, organising teams and planning cyber exercises.  It is vital that […]

InfoSec Colour Team Structure – The Green Team

The Green Team are created to maximise the effectiveness of the Blue and Yellow teams. They do this by integrating Yellow team members (with enhanced and in-depth knowledge of architecture and coding) with members of the Blue team that have the required defensive and operational skills. Ideally The Green Team shouldn’t be a permanent team, but […]