Bulletin
/ Latest
Ransomware – If you pay a ransom, do you get your data back?
Nov 11 2022
In this week’s bulletin, Charlie discusses paying a ransom to retrieve your data and shares his research on how much...
Learning from the Scottish Cyber Summit
Oct 28 2022
Charlie attended The Scottish Cyber Summit earlier this week and has summarised points made by different speakers and panellists. Yesterday,...
Statutory Cyber Incident Reporting in the USA
Oct 14 2022
This week’s bulletin covers the new Cyber Security laws in America, how these incidents should be reported, and the organisations...
Cyber Attacks on Hospitals – What are the Impacts? (Part 2)
Sep 23 2022
This is part 2 of last week’s bulletin, discussing the dire impacts of a cyber attack on healthcare services. Communications...
Cyber Attacks on Hospitals – What are the Impacts?
Sep 16 2022
After conducting cyber incident exercises in a hospital this week, Charlie is sharing his key take aways and research, looking...
The 5 Golden Rules of When Business Continuity Software Goes Bad
Aug 19 2022
If you’re thinking about buying software for your business continuity roll out, this bulletin discusses what you have to be...
Have Cyber Attacks Killed People?
Aug 12 2022
This week, Charlie discusses the evidence behind cyber attacks indirectly causing the death and injury of people. Also, the importance...
CYBERUK 2022 – What Did We Learn?
May 13 2022
Charlie shares his thoughts on the recent CYBERUK 2022 conference. This week Dawn, the Business Development Manager from PlanB Consulting,...
What Happened to UK Data Privacy Compliance?
Apr 29 2022
It might be Brexit ‘no more European rules’ complacency or the all-consuming COVID-19 survival strategies – even a mixture of...
Looking After Your People During a Cyber Incident
Apr 01 2022
This week, Charlie discusses why it is so important to look after your staff after a cyber incident. Yesterday, I...
Ransomware Negotiation Tactics
Jan 21 2022
Charlie highlights the best advice from a great podcast all about ransomware. Read on to learn all about the best...
Amedia AS Cyber Hack Case Study: A review of their crisis communications from 28th December 2021 – 7th January 2022
Jan 07 2022
A deep dive into the Amedia AS cyber hack which occurred over the holiday period. Charlie discusses in-depth all the...
Learning Points From the SEPA Cyber-Attack
Nov 19 2021
Charlie lists the key points that you can learn, from the SEPA cyber-attack that occurred last year. He discusses what...
Closing the Gap Between Cyber Security and Business Continuity Management
Oct 29 2021
With cyber-attacks increasingly aiming to create business disruption, it is important for organisations to ensure that cyber security and business...
Low-Level Cyber Attacks
Sep 03 2021
Charlie looks at the lessons you need to take away from a low-level cyber attack. I am going to leave...
‘Countdown to Zero Day’ By Kim Zetter – Book Review
Aug 06 2021
This week Charlie reviews ‘Countdown to Zero Day’ by Kim Zetter. The book is all about the virus that sabotaged Iran’s...
Cyber Podcasts You Need To Listen To!
Jul 30 2021
As podcasts are becoming the new ‘thing’, Charlie shares his three favourites. Keep up-to-date with business continuity by listening to...
Kaseya Attack: What is a Supply Chain Cyber Attack?
Jul 09 2021
In today’s bulletin, Charlie discusses how supply chain cyber attacks affect different organisations, in particular Kaseya. The Kaseya cyber-attack has...
Process Controls, SCADA and Cyber Security
Jun 04 2021
This week, Charlie discusses the effects a cyber attack can have on an organisation’s process control and SCADA systems. For...
The Differences Between a Cyber and a ‘Normal’ Incident
May 28 2021
This week, to celebrate our updated cyber course, BCT Certificate in Cyber Incident Management, we take a look back at some...
Communications with Stakeholders after a Ransomware Attack
Apr 30 2021
This week Charlie discusses the issues associated with communications after a cyber-attack, and how to develop a plan that will...
The Hidden Costs of Ransomware
Apr 23 2021
This week Charlie talks about costs that are often overlooked when dealing with ransomware attacks. I am signed up to...
Credential Stuffing – A different type of cyber attack
Mar 12 2021
Charlie discusses credential stuffing, a type of cyber attack which you should be looking out for! “The irony of credential...
Beware of the self-wiggling mouse – Cyber vulnerabilities in the water industry
Feb 19 2021
This week Charlie looks at the risk of a cyber-attack and the importance of reviewing your vulnerability to water, wastewater...
Newsletter Signup
Like what you are reading?
Sign up to our weekly bulletin and get the latest articles straight to your inbox!