Skip to content
Logically Secure Ltd
Menu
  • Testing Services
  • Incident Response
  • Consulting
  • Blog
  • About Us
    • Careers
    • Contact Us
    • Data Handling

Category: Incident Response

Cyber security key words
Article / Cyber security / Incident Response / Information Security / Security / Software Security

10 fundamental steps of cyber security

The original ‘10 steps to cyber security’ were published in 2012 and are now used by a majority of the FTSE350. How do you protect your sensitive data and personal …

Article / Cyber security / Incident Response / Ransomware / Security / Statistics

13 scary cyber facts for Halloween

As it fast approaches, we thought we’d give you 13 scary cyber facts for Halloween. Don’t have sleepless nights, check your cyber security! Check out these 13 scary cyber facts  …

Article / CyberCPR / Incident Response

Why Cyber Security is important for small businesses

Cyber Security – a business necessity, not just a nice-to-have As technology offers small and medium enterprises (SMEs) so many more opportunities, so does it bring increasing and new cyber …

CyberCPR / Front Page / Incident Response / News

New CyberCPR Pro SaaS Version

Building a Remote Cyber Incident Response Capability – for just £249 per month!  Building an incident response capability can be expensive, especially when faced with the problem of deploying and …

Front Page / Incident Response / News

SANS Munich18 @night presentation

Explaining Incidents to executives in ways they understand Here are the slides from my presentation on the Tuesday 21 March at the SANS Munich event. I hope you enjoyed the …

CyberCPR / Incident Response

New Release of CyberCPR Community

Following some changes to the Enterprise version of CyberCPR we have decided to spread the joy and thus we have updated the Community version of CyberCPR. If you are interested …

Recent Posts

  • 9 Basic Steps to help check an email isn’t Phishing
  • 5 key security factors to working from home more safely
  • 11 Common Cyber-attack Methods
  • 10 fundamental steps of cyber security
  • The Importance of Two-Factor Authentication (2FA)
Copyright © 2023 Logically Secure Ltd