PCI DSS v4.0 – Everything you need to know

With the number of cyber threats targeting businesses increasing every day, a cyber security solution that can provide complete protection is a requirement for any enterprise.

Over 60 billion threats – endpoint, email, and identity-based – now exist within a growing cybercrime ecosystem. These threats, as well the millions being created every day, can contribute to disastrous attacks and data breaches that can bring any business to its knees.

To help our customers stay protected from these threats, Wizard Cyber have created CYBERSHIELD XDR 360°. Designed with the modern state of cybercrime in mind, this solution has been developed to combat every possible cyber threat that would affect a business.

Read more

New Ransomware LokiLocker Threatens Organisations

With the number of cyber threats targeting businesses increasing every day, a cyber security solution that can provide complete protection is a requirement for any enterprise.

Over 60 billion threats – endpoint, email, and identity-based – now exist within a growing cybercrime ecosystem. These threats, as well the millions being created every day, can contribute to disastrous attacks and data breaches that can bring any business to its knees.

To help our customers stay protected from these threats, Wizard Cyber have created CYBERSHIELD XDR 360°. Designed with the modern state of cybercrime in mind, this solution has been developed to combat every possible cyber threat that would affect a business.

Read more
Kaspersky

Organisations advised to reconsider use of Russian software

With the number of cyber threats targeting businesses increasing every day, a cyber security solution that can provide complete protection is a requirement for any enterprise.

Over 60 billion threats – endpoint, email, and identity-based – now exist within a growing cybercrime ecosystem. These threats, as well the millions being created every day, can contribute to disastrous attacks and data breaches that can bring any business to its knees.

To help our customers stay protected from these threats, Wizard Cyber have created CYBERSHIELD XDR 360°. Designed with the modern state of cybercrime in mind, this solution has been developed to combat every possible cyber threat that would affect a business.

Read more

How CYBERSHIELD XDR 360° can protect against all cyber-attacks

With the number of cyber threats targeting businesses increasing every day, a cyber security solution that can provide complete protection is a requirement for any enterprise.

Over 60 billion threats – endpoint, email, and identity-based – now exist within a growing cybercrime ecosystem. These threats, as well the millions being created every day, can contribute to disastrous attacks and data breaches that can bring any business to its knees.

To help our customers stay protected from these threats, Wizard Cyber have created CYBERSHIELD XDR 360°. Designed with the modern state of cybercrime in mind, this solution has been developed to combat every possible cyber threat that would affect a business.

Read more

How is the CMMC 2.0 model structured?

In November 2021, the US Department of Defence (DoD) announced CMMC 2.0. This new iteration of the CMMC model restructured and repurposed it, increasing the number of controls that businesses needed to meet to gain certification as well as associating it directly with NIST SP 800-171 and SP 800-172.

By coordinating with the National Institute of Standards and Technology (NIST), the DoD were able to create a simpler structure, built around the 800-171 and SP 800-172 controls. Whilst these controls were stricter and more difficult to meet, the system was easier to follow for businesses. As well as looking to improve the cyber security readiness of the defence industrial base, the DoD wanted to provide a certification that was clear and understandable.

Read more
What to do if you are hacked

My business has been hacked, what should I do?

When you realise that your business has been successfully hacked, a lot of questions run through your mind. How were we hacked? Why were we hacked? Did they steal our data? What happens next? Are we going to be in financial or legal trouble?

If you haven’t dealt with the consequences of being hacked before, it can be a confusing and frightening experience.

The outcomes can range from offering compensation to those affected, receiving a regulatory fine, improving your cyber security systems, or none of the above. It all depends on your specific circumstances.

In this blog, we are going to discuss what you should do when you realise that your business has been hacked. If you don’t have a cyber security partner, the following steps are vital to containing the damage and following proper protocol. If you do have a cyber security partner, this will differ, but we will cover that too.

Read more

4 terrifying cyber security statistic every SME needs to know

With the number of cyber-attacks on SMEs continuing to rise in 2022, and the threat of Russian cyber-attacks in February and March, small businesses can no longer afford to ignore proper cyber security.

Over the last several years, instances of cybercrime have risen by over 600%. Combined with the fact that approximately 43% of all cyber-attacks target SMEs, a situation has been created in which smaller businesses are becoming easier and more fruitful targets for cybercriminals.

Read more

In-house VS Outsourced SOC: What should you choose?

Businesses around the world continue to digitally transform in a rapid and innovative way. With the widespread adoption of remote and hybrid working, new technologies are being adopted to improve collaboration and communication, as well as access to data, applications, storage devices, and networks from anywhere in the world.

With these innovations, though, comes an increased level of security risk. As businesses rely on these technologies for almost all of their vital functions, a targeted cyber-attack could cripple an organisation in a matter of minutes.

Read more
april fools day cyber security advice

4 reasons why cyber security is no joke

Even though today is April Fool’s Day, it’s important to recognise that some things shouldn’t be joked about. With almost 40% of businesses being the target of a cyber-attack in 2021 – many of which are SMEs with a distinct lack of cyber security – cybercrime has become no laughing matter.

The COVID-19 pandemic has led to cybercriminals becoming bolder and developing new and dangerous tactics. As people spend more and more of their time online and businesses become increasingly dependent on connectivity and collaboration platforms to remain productive, cybercriminals have spotted an opportunity to take advantage of underprepared individuals and organisations.

This April Fool’s Day, we are discussing the importance of effective cyber security. Whether you are a small business or a multinational enterprise, here are the reasons why you should be striving to have the most resilient cyber security possible.

Read more
Microsoft defender for endpoint protects all devices

Leveraging Microsoft Defender for Endpoint for CMMC 2.0

Following the announcement of the Cyber Security Maturity Model Certification programme (CMMC) 2.0 by the US Department of Defense (DoD) in November 2021, businesses have been forced to fast track their cyber security development and increase their budgets.

This reworked CMMC is designed to improve cyber security resilience and standards throughout the DoD’s supply chain as well as effectively safeguard sensitive information and improve accountability. Based upon the NIST SP 800-171 and SP 800-172 practices, businesses that are required to meet levels 1, 2, or 3 of this new framework will have to review their cyber security programme imminently and make the necessary changes.

Read more

What is the difference between penetration testing and a cyber security review?

When organisations want to test their cyber security readiness, it can be confusing to know what they need to do. Many testing services highlight vulnerabilities and flaws within their system but do so in different ways. Ultimately, it’s important to utilise a variety of testing techniques to ensure that every aspect of a system is protected.

Initially, we would always recommend a cyber security review followed by internal, external, and, if applicable, web application penetration testing. When we describe these services to organisations, though, they often question the difference between the two.

Read more

What are the consequences of my business being hacked?

With instances of cybercrime continuing to rise dramatically throughout 2020 and 2021, cyber security has become a focus for many organisations. Examples of high-profile data breaches and hacks have spurred this focus even more, with Dixons Carphone, Tesco, and many more experiencing such breaches in 2021 alone.

Unfortunately, just as there are many businesses proactively preparing, a lot of businesses are being forced to react to a hack. Experiencing a data breach and then attempting to build a cyber security presence in a short space of time is one of the worst ways to approach the problem.

To help organisations adopt a more proactive approach, we thought it was important to highlight the consequences they could face if they were the victim of a successful hack. Keep reading to find what could happen to your business if you were hacked.

Read more

Should I hire a Microsoft Sentinel Security Analyst?

When you are considering the future of your cyber security policy, you will probably arrive at the question: do I need to hire more security analysts? Often, lack of resources within a security team is one of the leading drivers for investing further in cyber security.

In this article, we are going to explore the pros and cons of hiring internal security analysts. For clarity, we will be focusing on Microsoft Sentinel, but your company might use another SOAR or SIEM solution for your cyber security needs. Don’t worry, the points we discuss will be applicable regardless of the solution you use.

Read more

Microsoft Sentinel vs. Splunk

When organisations come to us wanting to set up a security information event management (SIEM), they often have two options in mind: Microsoft Sentinel or Splunk. Whilst the two solutions do have some similarities, they differ in a variety of ways, which we’ll explore in this article.

We will look at integrations, SIEM functionality, cost-effectiveness, analytics, threat intelligence, and much more. As well as looking at functionality and the details of each solution, we will discuss how each solution may be better for certain organisations as well as our recommendations when it comes to installing a SIEM or security orchestration and automated response (SOAR) solution.

Read more

Best SIEM Tools in 2022

With the increasing number of SIEM tools available in 2022, it can make choosing the right one difficult. To help you pick the right one, we have put together a list of some of the best SIEM tools around, as well as some details on when and why you should use them.

SIEM tools come in all shapes and sizes, with some offering affordability over functionality and others offering the opposite. We’ll cover a good mixture of the two here and hopefully, provide a couple of options that fit the bill for your organisation.

Read more

What is Ethical Hacking? Everything you need to know in 2022

There’s a negative connotation around the word “hacking”. Despite this, many hackers are using their skills for good, promoting the idea that the internet can be a safer place for all of us.

Understanding the term “ethical hacking” is important for people and businesses alike. It demonstrates that hacking can be a positive thing when used correctly. In this article, we are going to discuss what ethical hacking is, how it can be used to benefit a business, and why you should be aware of it.

Read more