11th November 2025
Hilton London Canary Wharf
June 2026
Hilton London Canary Wharf

GUEST BLOG: People and processes are key to effective cyber security

Alan Calder Founder and Executive Chairman at IT Governance Cyber security investment continues to spiral, with Gartner predicting global security spend will reach £71.72 billion by the end of the year, as a result of regulatory change, mindset and a growing awareness of threats. And with over 40 per cent of UK businesses experiencing some […]

GUEST BLOG: Phishing and Facebook – A test of reputation for businesses

By Asaf Cidon, VP Email Security, Barracuda Networks   Facebook is never far from the news agenda, so it was no surprise to see the company under the media spotlight again when it was revealed that a recent hack exposed the personal information of 30m users. After polling visitors to Cloud Expo earlier this year […]

GUEST BLOG: Security insights from the outer edge

Gallagher Security Perimeter Product Manager, Dave Solly, talks about security at the perimeter and not just at the door… If there’s one area of security that’s often overlooked in commercial channels, it’s perimeter. This all too common gap in thinking is preventing businesses from really solving their security issues, often issues they don’t realise, or don’t […]

GUEST BLOG: 5 tips for a winning risk management strategy

By Gallagher Risk comes in many forms, with varying degrees of cost to your business and recovery times. Here are a few items worth considering when it comes to producing a risk management strategy: 1. Take care of your people Staff really are the most important asset within an organisation. From a risk management perspective, […]

GUEST BLOG: 60 must-know cybersecurity statistics for 2018

By Varonis Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common in the workplace, like mobile and IoT devices. Additionally, recent research suggests that most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to […]

GUEST BLOG: The anatomy of a phishing email

By Varonis Phishing scams are one of the most common ways hackers gain access to sensitive or confidential information. In fact, according to the Verizon’s 2018 Data Breach Investigations Report, phishing is involved in 70 percent of breaches that feature a social engineering component. What is Phishing? At the most basic level, a phishing scam […]

GUEST BLOG: Having the right connections – Are VPNs really fit for purpose?

Stuart Sharp, Global Director of Solutions Engineering at OneLogin Remote working has fast become commonplace in today’s business landscape. Free from the stress of the modern-day workplace, employees are increasingly keen to opt for the laptop and crack on with work uninterrupted, all from the comfort of their own home. In fact, the Office for […]

GUEST BLOG: Social Media Security – How safe is your information?

By Varonis In 2012 a massive cyber attack by a hacker named “Peace” exploited over 117 million LinkedIn users’ passwords. After the dust settled from the initial attack, new protocols were put in place and the breach was all but forgotten in the public eye, the same hacker reared their head again. Nearly five years […]

GUEST BLOG: Do Americans Ever Change Their Passwords?

By Varonis Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals. In 2017 alone, the Equifax breach — considered by some to be the worst security breach in recent history — put 145.5 million Americans at […]

GUEST BLOG: GDPR and CCTV – This will impact your business!

GDPR

By 2020 CCTV Is your business prepared for the implementation of the General Data Protection Regulation (GDPR)? Set to be introduced on the 25th May 2018, considering what actions you must take is essential to ensuring your company does not face the tough consequences that have been set out. GDPR is set to replace the Data […]