Securing business data


View some of the latest blog posts from our Cyber Security experts...

  • 16

    The Security Train - Beware of the Crops

    by Giulia Foss
    The Security Train - Beware of the Crops
  • 15

    WhatsApp Call of Doom...(or CVE-2019-3568 if you prefer...)

    by Giulia Foss
    WhatsApp suffers cyber security attack
  • 31

    Women in IT: Nicole’s Story

    by Giulia Foss
    Nicole works on the cybersecurity frontline, keeping our clients safe from cyber-attacks. During her shifts, she responds to security alerts raised by Six Degrees’ security monitoring software. If she considers the alert serious enough, she will raise a ticket which is sent to the client.
  • 10

    British Airways Suffers Huge Data Breach at Hands of Organised Cyber Criminals

    by Giulia Foss
    British Airways, what to do in an emergency!
  • 04

    Who do you trust? Networks...

    by Giulia Foss
    Exactly what is a trusted network? For many it is the supposedly secure haven in which network operations can happen without fear of compromise. Typically, it is segmented and access is limited through devices such as firewalls and role-based access control. In the PCI DSS world, the Cardholder Data Environment (CDE) is the classic example of such a design. The wider internal network is protected by the normal username / password combination that we’re all familiar with. As a concept, it has worked well and provided a reasonable level of protection for corporate environments. At its heart is the view that all devices connected to the network ensure some form of trust

Join our mailing list to ensure you keep up with all of the latest in Cyber Security.

call us

Get in touch

Talk to our experts today +44 (0) 20 7592 8800

Send us a message

We'll get back to you Send us a message

Connect with us

See what we're saying elsewhere