ICO website still down after crypto-mining hack
12th February 2018 News
Over 4,000 websites - including a large number of UK Government and NHS websites - were compromised after a hack on a popular accessibility plugin.
Read More arrow_forwardCyber consultancy, auditing, training and virtual CISO & DPO covering the whole of mainland Scotland and the Western Isles
Brandfire is a 360° cyber security specialist with 25 years experience working with some of the biggest and most targeted names on the planet. All of this knowledge has fed into the development of the Brandfire methodology - a pragmatic approach to protecting small to medium sized businesses with limited resources at their disposal.
We don't sell hardware, software or services - so you'll get honest answers without the fear-factor.
As published cyber-security authors, we're used to speaking plain English, not techno-babble.
You probably don't have endless resources, so we've got a few tricks up our sleeve.
Ensuring your business stays viable after an attack
Cyber criminals are highly motivated and have far more resources than your business has to defend itself. Your first priority as a business owner is to stay viable.
Data Protection and GDPR
Companies run on data.
The cyber threat is very real for every individual and business - but with so much sensationalist news it's often difficult to get a balanced view.
There are only two types of companies: Those that have been hacked and those that will be hacked. ”
12th February 2018 News
Over 4,000 websites - including a large number of UK Government and NHS websites - were compromised after a hack on a popular accessibility plugin.
Read More arrow_forward2nd February 2018 News
Scotland's business support network Business Gateway recommends "changing passwords regularly" - advice which was discredited in back in 2015.
Read More arrow_forward1st February 2018 Comment
Another day and another e-mail or banner ad touting encryption as the 'solution' to all GDPR woes.
Read More arrow_forwardUnderstanding the practical limitations for users
Reviews into useful technology
Original research into automated crime networks