Skip to main content

The Cyber Resilience Centre for London
Latest News

Latest News

Stay informed with the latest updates from the Cyber Resilience Centre for London and keep on top of all developments in cyber crime.

Thursday 25 January 2024

Tierney Kimmins-McLoughlin

Tech Show London has been officially accredited by The CPD Group, a globally recognised accreditation body.

This accreditation marks a pivotal moment for Tech Show London, an event that brings together five leading technology events: Cloud Expo Europe, DevOps Live, Cloud & Cyber Security Expo, Big Data & AI World, and Data Centre World.


Wednesday 17 January 2024

Richard Starnes

Cybersecurity threats continue to evolve, with ransomware attacks, zero-day vulnerabilities, and supply chain attacks posing significant risks to organizations. To address these threats, organizations can adopt a manageable security framework like Cyber Essentials Plus (CE+). In this article, we will explore how CE+ can help mitigate these three key cybersecurity challenges, providing insights into its principles and best practices for enhanced protection.


Tuesday 07 November 2023

Tierney Kimmins-McLoughlin

Recently, we were able to coordinate our busy schedules (no easy feat!) and come together as a team for a dynamic training session with Cyber Griffin, City of London Police’s initiative to support businesses and individuals in the Square Mile to protect themselves from cybercrime.


Tuesday 07 November 2023

Tierney Kimmins-McLoughlin

Our CEO Simon Newman was recently asked by the press for comment on a range of cybersecurity topics, how they affect everyday citizens, and how they might be challenged on a day-to-day basis. Read on for his valuable insight and practical tips that you can put in place to better protect yourself now.


Tuesday 07 November 2023

Tom Lejava

In an increasingly digital world, the security of digital assets has become the linchpin in the vast ecosystem of cyber security. Today, we'll dive into the core role that User Privilege Management (UPM) plays in securing digital assets, and why it's a cornerstone of robust SME cyber security.

UPM, an often-overlooked aspect of IT management, is the process of controlling, monitoring, and administering the rights or permissions given to users within a system. These privileges could include access to files, the authority to modify system settings, and even the power to install or uninstall applications.


Tuesday 07 November 2023

Tom Lejava

In today's world of ever-evolving digital threats, cyber resilience is not just a priority but an imperative. However, an often overlooked yet crucial component of cyber resilience is effective user privilege management. User privilege management is the practice of defining, controlling, and monitoring user access rights within a network or system. It's the unsung hero of basic cyber security, allowing us to maintain secure access to our systems while balancing productivity.


Tuesday 07 November 2023

Tom Lejava

In our modern digital world, safeguarding our networks and data from cyber threats has become not just a priority but a necessity. Among the plethora of strategies available, one stands out as being both simple and efficient, yet often overlooked: User Privilege Management (UPM). The Cyber Resilience Centre for London champions this approach as an essential element of basic cyber security, ensuring a proactive defence against burgeoning threats.


Tuesday 07 November 2023

Tom Lejava

In today's digital era, where the exponential growth of technology has revolutionised the way we live and work, there is an increasingly acute need to fortify our systems against cyber threats. With the constant evolution of technology, cyber security, specifically the concept of 'User Privilege Control,' has become paramount in the quest for secure systems.


Tuesday 07 November 2023

Tierney Kimmins-McLoughlin

Privilege Management, often referred to as authorization, is a method by which users’ access to resources is allowed or denied. In the OWASP Top 10, vulnerabilities related to privilege management fall under the heading of Broken Access Control. In the most recent iteration of the Top 10 it is at the top of the list, meaning it has a higher occurrence in tested applications than any other vulnerability type.


Tuesday 07 November 2023

Tierney Kimmins-McLoughlin

If you go to your search engine of choice and type in “privilege management”, you’ll be inundated with adverts from companies who want to sell you a software solution. What exactly is privilege management? Does it relate to just infrastructure, or also websites? Is there a software solution that will help with it? That’s what we’ll discuss here.


Tuesday 07 November 2023

Tom Lejava

In today's digital age, data breaches are becoming increasingly common. SMEs are particularly vulnerable to cyber-attacks, as they often lack the resources to implement robust cybersecurity measures. However, one area that is often overlooked is secure device disposal. Proper disposal of devices such as laptops, phones, and tablets is critical for protecting sensitive information and maintaining cyber resilience.


Tuesday 07 November 2023

Tom Lejava

In today's fast-paced digital world, cyber threats are becoming increasingly sophisticated, and organizations of all sizes are at risk of being attacked. Small and medium-sized enterprises (SMEs) are particularly vulnerable to cyber-attacks due to limited resources and outdated technology. This is why modernising your defence is crucial to protecting your business and ensuring its longevity.


Friday 26 May 2023

Tom Lejava

In today's rapidly transforming digital landscape, prioritizing the protection of your Small to Medium Sized Enterprises (SMEs) against cyber threats is essential. As technology advances, so too do the threats that your business faces. One of the key aspects of maintaining robust SME cyber security is to make sure your equipment is up to date and secure. The Cyber Resilience Centre for London presents this comprehensive guide to help businesses transition smoothly from old to new while safeguarding their precious digital assets.


Become Part of Our
Community

Community membership is free

National Cyber Security Centre (NCSC) Products and Services

  • NCSC Small Business Guide
  • NCSC Exercise in a Box
  • NCSC Board Toolkit
  • NCSC Weekly Threat Report
  • Other relevant NCSC Guidance