News

NCSC’s Annual Report – What You Need To Know

Robert Wilson

NCSC’s Annual Report – What You Need To Know  Following the National Cyber Security Centre’s latest annual report, we review the outputs and highlight areas both business and security leaders need to be mindful of in their resilience planning.  Ransomware remains one of the greatest threats to the UK.  In the past year, almost 300 ... Read more

Helping Businesses Achieve Cyber Essentials

Robert Wilson

Helping Businesses Achieve Cyber Essentials – Jayne Moore Media  The Background  Jayne Moore Media (JMM) needed to become Cyber Essentials and Cyber Essentials PLUS accredited.  There were several key reasons for this, namely:  What Amicis Did  As this was the first time JMM had sought accreditation, there were a few aspects that needed understanding and ... Read more

Don’t Be Scared – Embrace Cybersecurity

Robert Wilson

Embrace Cybersecurity: Why you should not be scared  Introduction  In today’s digital age, the term “cybersecurity” has become a buzzword, often associated with fear and uncertainty.  Many people are apprehensive about the security of their personal and professional information in the face of cyber threats. While it’s crucial to be aware of the potential risks, ... Read more

SMB’s Struggling With Pace Of Change

Robert Wilson

SMBs struggling with pace of change  Following research published by Sage last week, some stark, key findings highlight the growing challenges SMBs are facing in keeping up with and managing threats to their digital estates.  Following 2,100 online interviews with decision makers in SMBs with up to 499 employees, across nine countries, the key findings ... Read more

Insider Threats In Your Organisation

Robert Wilson

Insider Threats in your organisation – Monitoring and Prevention Strategies In today’s interconnected digital world, businesses face an increasing array of cybersecurity threats, and among the most challenging to combat are insider threats. Insider threats are potential risks posed to an organisation’s security by its own employees, contractors, or business partners who have authorised access ... Read more

PTaaS Use Case – Housing Associations

Robert Wilson

PTaaS use case: Housing Associations  The Situation:  We were engaged by a large housing association, who have been busy developing and growing their infrastructure from a purely on premise resource to a hybrid mix of on premise and cloud services, to provide an overview of its resilience to both external and internal compromise.  There were ... Read more

NorthCap Enters The Private Equity Arena

Robert Wilson

NorthCap Cyber enters the Private Equity arena  NorthCap Cyber, a Private Equity focussed practice and partner organisation of Amicis officially launches its market offering.  Crafted to harmonise with the complete investment lifecycle, our Portfolio Company Cybersecurity Assessment Program minimises potential risks to portfolio value and profit, while delivering a clear, comprehensive view of cybersecurity maturity ... Read more

Securing Medtech

Robert Wilson

Securing Medtech IOT security, and medical devices in particular, have come under intense scrutiny in recent years for the cyber risks that surround them.  Given the nature of what they are responsible for, and the severe consequences of breaches to sensitive medical data, operating these devices requires considerable effort to mitigate the associated risks.  In ... Read more

Penetration Testing – Why, When, How

Robert Wilson

Penetration Testing – Why, When and How Penetration testing brings value and informs critical business decisions in a wide variety of scenarios.  Below, we highlight several instances where utilising this service   to secure their key technology systems and thereby help fuel business innovation and growth.  They also demonstrate the need to undertake this regularly ... Read more

NIST Framework Updates

Robert Wilson

NIST framework updates Last week, the National Institute of Standards and Technology (NIST) released a draft version of their Cybersecurity Framework (CSF) 2.0.  Below we analyse the changes, what they could mean for your organisation and the opportunities they present. Credit: N. Hanacek/NIST While the five key NIST pillars of Identify, Protect, Detect, Respond and ... Read more

Ready to get started?