
Long Read: NCSC 2025 Review: What CIOs Must Do as Major Attacks Surge
Empty shelves at M&S were not the real warning sign. The 50 per cent rise in nationally significant attacks was.

Deepfakes, voice clones, and AI-written lures
European Cybersecurity Month highlights social engineering for good reason. Attacks now target people more than code. Even a cloned voice or a routine approval process can lead to failures, despite having good controls in place. These issues can be avoided only if leadership recognises social engine …

Your supply chain just got stronger
Cyber Essentials Renewed Conosco has renewed Cyber Essentials Plus for another year, with the new certificate issued this October. The assessment confirms that core controls are in place, operating correctly, and applied to real devices across the environment that underpins client services. That inc …

Windows 10 end of support: what actually happens on 14 October 2025
Windows 10 support ends on Tuesday, 14 October 2025. That switch does not power off devices; it changes the risk. Security updates for Windows 10 stop, which means exploits widen, and insurers, auditors, and procurement officers will ask more complex questions. Microsoft is clear about what ends, an …

Penetration testing for first-timers: how to know if you need one
Most first Penetration Testing projects are bought for the wrong reason. A client asks for a certificate, cyber insurance tightens its wording, or a board member reads about an incident and wants reassurance by quarter-end. Penetration Testing is most effective when it is risk-driven and well-scoped …

Long read: what the BBC got right, and where leaders must push further
This long-form analysis responds to the BBC’s investigation, “The true cost of cyber attacks – and the business weak spots that allow them to happen,” examining the incidents that halted Jaguar Land Rover, disrupted Marks & Spencer and Co-op, and exposed the fragility of the UK’s critical supply …

When one portfolio company gets hacked, you all pay.
Portfolio companies don’t face a single cyber risk. They face a networked risk. A compromise at one portfolio company often exposes shared vendors, credentials, and processes that repeat across the rest of the fund. That’s aggregation. It’s why ransomware and supply-chain attacks scale so efficientl …

A guide to cyber insurance in 2025
Mid-sized UK businesses have seen a continued rise in cyber threats over the last year, with more data emerging from 2024 reports. The UK Government’s Cyber Security Breaches Survey 2024 shows that 34% of businesses reported a breach or attack in the previous 12 months—up from 32% in 2023—indicating …

October Cybersecurity Awareness: Stay ahead of cybercrime
With October’s cybersecurity awareness month helping us focus, we’ve been thinking about how to stay ahead, efficiently. Cybercriminals evolve all the time, and so must our business’s cybersecurity measures. The days of relying solely on antivirus software and firewalls are long gone. Surviving busi …

October Cybersecurity Awareness: Protecting your business from the inside out
Cybersecurity is a central component of every business’s strategy. From securing internal networks to managing third-party risks, businesses constantly adapt to stay ahead of cyber threats. As BBC News reported, small businesses will absorb most of the hit being the easier targets. They are three ti …
