Introduction to red teaming
In the world of cybersecurity, there is a constant and ongoing battle between the white hats (the good guys) and the black hats (the bad
In the world of cybersecurity, there is a constant and ongoing battle between the white hats (the good guys) and the black hats (the bad
Hive is a growing ransomware group that only appeared last year, but they have been growing ever since and now present a very serious threat
Linkedin Author: Stephen Fowler, Director of Technologies Stephen writes about the importance of social engineering training. If you would like to talk about your own
In social engineering, phishing campaigns often involve spending out bulk emails to countless addresses with fake premises and links, in the hope that one employee
Threats have evolved. Get ahead of the risk with Tenable One – anticipate likely attacks and proactively reduce your cyber risk. Your attack surface is
The International Organisation for Standardisation periodically updates ISO 27001 and related standards to keep pace with technological developments. The latest versions of ISO 27001 and
We know getting Cyber Essentials certified can be a complicated process. At OmniCyber Security, we provide you with support throughout your assessment, and to that
Businesses that store card information for customers making future payments are ripe targets for hackers. Phishing schemes targeting individuals produce the odd return but targeting
Linkedin Author: Stephen Fowler, Director of Technologies Stephen writes about the current increased cybersecurity risk to your business. If you would like to talk about
The Payment Card Industry Data Security Standard was introduced to promote card data security globally and provide a standard that all businesses that hold cardholder
Linkedin Author: Stephen Fowler, Director of Technologies Stephen writes about this year’s Cybersecurity Awareness Month. If you would like to talk about your own cyber
In its most basic form, hacking involves a malicious actor trying to guess a password to gain access to your account. There are more sophisticated
Apple released its iOS 16 update last week, offering users plenty of lock-screen customisation and the ability to unsend messages and emails. However, the most
Our Cyber Essentials checklist is the perfect tool to make sure you and your organisation are well-prepared for the CE assessment.
Hackers have used the opportunity offered by NASA’s new James Webb telescope to try and spread some malware