Cyber

Guarding The Cloud: Why Relying Solely on Vendors Isn’t Enough for UK SMBs

Robert Wilson

In the ever-evolving landscape of digital transformation, small and medium-sized businesses in the United Kingdom are increasingly adopting cloud solutions to streamline operations and enhance efficiency. However, as these businesses migrate their critical data and applications to the cloud, the need for robust cloud security measures becomes paramount. While cloud service vendors provide a baseline ... Read more

Why Are Local Councils So Regularly The Victims Of Cyber Attacks? 

Robert Wilson

In recent years, local councils in the United Kingdom have found themselves in the crosshairs of cyber criminals, facing a surge in cyber attacks that threaten the security and confidentiality of sensitive data. This alarming trend raises the question: why are local councils in the UK so regularly targeted in cyber attacks? This article explores ... Read more

CTS Hack – Guidance For Legal And Conveyancing Firms

Robert Wilson

CTS Hack – Guidance For Legal And Conveyancing Firms  Following the news in the past few days of the cyber attack on CTS, we have outlined some key points on what has happened and critically what you should do if you are concerned about the impact of this incident.  What Has Happened?  There has been ... Read more

NCSC’s Annual Report – What You Need To Know

Robert Wilson

NCSC’s Annual Report – What You Need To Know  Following the National Cyber Security Centre’s latest annual report, we review the outputs and highlight areas both business and security leaders need to be mindful of in their resilience planning.  Ransomware remains one of the greatest threats to the UK.  In the past year, almost 300 ... Read more

Helping Businesses Achieve Cyber Essentials

Robert Wilson

Helping Businesses Achieve Cyber Essentials – Jayne Moore Media  The Background  Jayne Moore Media (JMM) needed to become Cyber Essentials and Cyber Essentials PLUS accredited.  There were several key reasons for this, namely:  What Amicis Did  As this was the first time JMM had sought accreditation, there were a few aspects that needed understanding and ... Read more

Don’t Be Scared – Embrace Cybersecurity

Robert Wilson

Embrace Cybersecurity: Why you should not be scared  Introduction  In today’s digital age, the term “cybersecurity” has become a buzzword, often associated with fear and uncertainty.  Many people are apprehensive about the security of their personal and professional information in the face of cyber threats. While it’s crucial to be aware of the potential risks, ... Read more

SMB’s Struggling With Pace Of Change

Robert Wilson

SMBs struggling with pace of change  Following research published by Sage last week, some stark, key findings highlight the growing challenges SMBs are facing in keeping up with and managing threats to their digital estates.  Following 2,100 online interviews with decision makers in SMBs with up to 499 employees, across nine countries, the key findings ... Read more

Insider Threats In Your Organisation

Robert Wilson

Insider Threats in your organisation – Monitoring and Prevention Strategies In today’s interconnected digital world, businesses face an increasing array of cybersecurity threats, and among the most challenging to combat are insider threats. Insider threats are potential risks posed to an organisation’s security by its own employees, contractors, or business partners who have authorised access ... Read more

NorthCap Enters The Private Equity Arena

Robert Wilson

NorthCap Cyber enters the Private Equity arena  NorthCap Cyber, a Private Equity focussed practice and partner organisation of Amicis officially launches its market offering.  Crafted to harmonise with the complete investment lifecycle, our Portfolio Company Cybersecurity Assessment Program minimises potential risks to portfolio value and profit, while delivering a clear, comprehensive view of cybersecurity maturity ... Read more

Securing Medtech

Robert Wilson

Securing Medtech IOT security, and medical devices in particular, have come under intense scrutiny in recent years for the cyber risks that surround them.  Given the nature of what they are responsible for, and the severe consequences of breaches to sensitive medical data, operating these devices requires considerable effort to mitigate the associated risks.  In ... Read more

Ready to get started?