News

Learning To Combat Cyber Threats

Robert Wilson

What are the greatest cyber threats to Training organisations? With L&D organisations holding so much personally identifiable information, they are a highly attractive target for threat actors.  Furthermore, for those operating in the funded learning or Apprenticeships space, there is an enormous level of auditing and compliance measures requiring continued maintenance. What do training organisations ... Read more

How Does PTAS Actually Work?

Robert Wilson

How does PTAS actually work? As more of our clients move to adopting PTAS for their infrastructure testing due to its cost effective commercials, fast-paced delivery and ability to conduct more regular assessments, we deep dive into how the service works, and the value it is showcasing. Today, organisations face various challenges when approaching penetration ... Read more

The Penetration Testing Landscape in 2023

Robert Wilson

The Penetration Testing Landscape in 2023 Penetration Testing has existed for over half a century.  Ethical hackers have embraced the task to ensure that computer systems remain secure from threat actors trying to compromise them.  The focus at the time of its conception was safety of information as computers gained the ability to share information ... Read more

Amicis Group listed in Techblast’s Manchester Startups 2.0

Robert Wilson

Amicis listed as one of Techblast’s Manchester Startups Last week, Amicis were delighted to be listed in the first edition of Manchester Startups 2.0.  These 25 founder-led startups are not backed by venture capital. Bootstrapped, pre-seed or angel-backed, the enterprises are in the early stages of their journey and either building or harnessing a unique ... Read more

Building Beyond Cyber Essentials

Robert Wilson

I have Cyber Essentials.  Now what? For UK organisations, or those trading in the UK, the reasons for achieving the Cyber Essentials certification are varied.  Some will apply for the accreditation as a mandate for doing business with public sector entities; others respect the need to demonstrate externally they take the protection of their data ... Read more

Protecting The Most Vulnerable

Robert Wilson

Protecting the most vulnerable – cyber attacks on charities   In today’s threat landscape, many hackers will happily target those putting up the least resistance for the easiest gain.  With charities, their resources and available budget to spend on cyber defences are often very low, making them a very easy target.  Below, we take a look ... Read more

Cyber Security In Recruitment

Robert Wilson

What are the greatest cyber threats to a recruitment agency?  With so much sensitive business and personal candidate data, recruitment firms are a highly attractive target for threat actors.  What methods are most commonly used to breach recruitment agencies?  And what can they do to protect business, their staff, and their candidates?  Phishing Attacks:  Recruiters ... Read more

The Latest Cyber Crime Trends

Robert Wilson

The UK Government’s Department for Science, Innovation and Technology recently published the Cyber Security Breaches Survey for 2023.  Below we look at some of the key findings and actions you can take to ensure your business doesn’t become part of these statistics. Headlines for cyber-attacks on UK businesses in the past 12 months: 2.39 million ... Read more

Cyber Security In Small Business

Robert Wilson

Gone are the days of threat actors solely targeting large businesses and governments for malicious gain.  With large security teams and layers of defence continuously combatting hackers, their attention for some time has turned to easier targets, often with valuable assets to capture with minimal effort required.  The consequences of a cyber attack on a ... Read more

Bringing Penetration Testing Into The Modern Day

Robert Wilson

In today’s way of living and working, where results are needed now, and outputs are required regularly to keep pace with continuous changes, especially in the digital world, are we really still accepting that penetration tests should take days to schedule, weeks to deliver and months to remediate the outputs? Following rigorous trials and feedback ... Read more

Ready to get started?