Skip to content
Logically Secure Ltd
Menu
  • Testing Services
  • Incident Response
  • Cyber Essentials
  • Consulting
  • Blog
  • About Us
    • Careers
    • Contact Us
    • Data Handling
    • Black Friday Phishing Campaign Offer 2020 – Terms
  • 12 Days of Cyber-mas

Category: Incident Response

Cyber security key words
Article / Cyber security / Incident Response / Information Security / Security / Software Security

10 fundamental steps of cyber security

The original ‘10 steps to cyber security’ were published in 2012 and are now used by a majority of the FTSE350. How do you protect your sensitive data and personal …

Article / Cyber security / Incident Response / Ransomware / Security / Statistics

13 scary cyber facts for Halloween

As it fast approaches, we thought we’d give you 13 scary cyber facts for Halloween. Don’t have sleepless nights, check your cyber security! Check out these 13 scary cyber facts  …

Article / CyberCPR / Incident Response

Why Cyber Security is important for small businesses

Cyber Security – a business necessity, not just a nice-to-have As technology offers small and medium enterprises (SMEs) so many more opportunities, so does it bring increasing and new cyber …

CyberCPR / Front Page / Incident Response / News

New CyberCPR Pro SaaS Version

Building a Remote Cyber Incident Response Capability – for just £249 per month!  Building an incident response capability can be expensive, especially when faced with the problem of deploying and …

Front Page / Incident Response / News

SANS Munich18 @night presentation

Explaining Incidents to executives in ways they understand Here are the slides from my presentation on the Tuesday 21 March at the SANS Munich event. I hope you enjoyed the …

CyberCPR / Incident Response

New Release of CyberCPR Community

Following some changes to the Enterprise version of CyberCPR we have decided to spread the joy and thus we have updated the Community version of CyberCPR. If you are interested …

Recent Posts

  • 9 Basic Steps to help check an email isn’t Phishing
  • 5 key security factors to working from home more safely
  • 11 Common Cyber-attack Methods
  • 10 fundamental steps of cyber security
  • The Importance of Two-Factor Authentication (2FA)

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • October 2019
  • September 2019
  • August 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • December 2016
  • October 2016
  • September 2016
  • June 2015

Categories

  • 504-wiki
  • Article
  • Business data
  • Conference
  • CVE
  • Cyber security
  • CyberCPR
  • Front Page
  • Incident Response
  • Information Security
  • News
  • Phishing
  • press
  • Ransomware
  • Security
  • Smishing
  • Software Security
  • Statistics
  • Testing
  • Working From Home
Copyright © 2019 Logically Secure Ltd