top of page
All Posts


How do we identify and mitigate insider threats?
Insider threats are one of the toughest cybersecurity challenges. Unlike external hackers, they come from trusted employees or partners with legitimate access. This blog explores how UK businesses can detect insider risks with behaviour-based monitoring, vCISO guidance, and zero-trust frameworks, all while protecting privacy and complying with GDPR.
Tom Foale
Aug 27, 20254 min read


How Cybersecurity Becomes a Competitive Advantage for CEOs and CFOs
Cybersecurity becomes a competitive advantage when CEOs and CFOs leverage vCISO, ransomware protection for business, predictive cybersecurity solutions, and AI-powered endpoint security to achieve faster recovery, lower risk, better compliance, and enhanced stakeholder confidence.
Tom Foale
Aug 17, 20253 min read


How to Simulate a Breach and Assess Business Impact
Simulating breach scenarios and calculating business impact requires continuous Breach-and-Attack Simulation (BAS), threat modelling, and translating results into cyber risk metrics via board-level dashboards.
Tom Foale
Aug 17, 20253 min read


We Just Got Phished, What Should We Do Next?
When a phishing attack strikes, speed and strategy matter: isolate affected systems, reset credentials with MFA, conduct full malware scans, activate anti-phishing defences, roll out phishing training, and communicate transparently to ensure recovery, rebuild resilience, and prevent repeat compromise.
Tom Foale
Aug 17, 20254 min read
AI in IT & CYBERSECURITY
Cutting Through the Hype, Facing the Risks, Seizing the Opportunities Executive Summary Artificial Intelligence (AI) is rapidly reshaping...
Tom Foale
Aug 16, 20255 min read
Why Traditional Antivirus Fails Against Zero-Day Threats
Executive Summary Traditional antivirus solutions, long considered the cornerstone of endpoint protection, are increasingly ineffective...
Tom Foale
Aug 8, 20253 min read
CYBERSECURITY GOVERNANCE
HOW CYBERSECURITY BECOMES A COMPETITIVE ADVANTAGE FOR CEOS AND CFOS Why Should Executives Prioritise Cybersecurity as Strategic Value? ...
Tom Foale
Aug 6, 20253 min read
Howden: cyber-attacks cost UK businesses £44bn in the last five years
The (re)insurance broker has estimated firms can reduce the cost of cyber-attack by up to 75% (£30bn) by implementing simple cyber...
Tom Foale
Nov 26, 20241 min read
5-EYES: ZERO-DAYS ARE THE MOST EXPLOITED VULNERABILITIES.
2023 Top Routinely Exploited Vulnerabilities. The “Five Eyes” - the cybersecurity agencies of the USA, the UK, Canada, Australia and New...
Tom Foale
Nov 22, 20241 min read
Apple OS VULNERABILITIES
22/11/24. Apple has issued patches for two critical zero-day vulnerabilities actively exploited by threat actors. These flaws allow...
Tom Foale
Nov 22, 20242 min read
Mailbombing Attacks
There is a current mail-bomb cyberattack underway on multiple businesses, large and small. Users are being targeted with large numbers of...
Tom Foale
Nov 22, 20241 min read


Get a Return On Investment in Cybersecurity
Cyber crime is often described as an escalating war. If so, it’s a war that the good guys are losing. Cybercrime costs are expected to...
Tom Foale
May 25, 20213 min read


Legally Defensible Cybersecurity
The threat from cyberbreaches has been growing for a long time. However, the cyberattack itself is no longer the biggest threat for the...
Tom Foale
Oct 19, 20205 min read


Privacy and Schrems II
On July 16, 2020, the Court of Justice of the European Union (CJEU) handed out its decision on Case C311-18 Data Protection Commission...
Tom Foale
Sep 17, 20206 min read
bottom of page
