- All
- Business Continuity Planning
- Compliance and Regulations
- Cybersecurity Best Practices
- Highlights
- Industry-Specific Security
- Others
- Risk Management Strategies

Incident Management in Information and Cyber Security
Introduction No defence is 100% guaranteed and at the early stages of an organisation’s information and cybersecurity roadmap all are vulnerable but, knowing how to respond to an incident can minimise its impact. An organisation that responds well to an incident may be viewed positively by external observers. This is why effective incident management processes … Read more

Everyone Matters in Staying Safe and Compliant- The Critical Role of Information and Cyber Security Awareness and Training
As founder of Pera Prometheus, I’ve encountered businesses of all sizes, each with varying degrees of security awareness. One common issue I often see is the confusion between Information Security and Cyber Security. While they are closely related, they are not the same thing, in fact Cyber Security is an element of Information Security. However, … Read more

Insider Risk Threat: Strengthening Your Organisation’s Defences
Information and cyber threats are an ever-present danger to organisations, and while external attacks from hackers and malware often make the news, one of the most damaging risks comes from within—“Insider threats.” Whether intentional or unintentional, these threats can significantly impact business operations, data security, and an organisation’s reputation. Understanding Insider Threats An insider threat … Read more

Business Impact Analysis: Building Resilience in Uncertain Times
Businesses must prepare for possible disruptions in the near or distant future as there is uncertainty everywhere in today’s digital economy. Continuing to operate during disruption and restoring to normal service is a huge challenge for today’s digital bound organisation and it requires forward planning. This forward-thinking approach is the foundation of Business Impact Analysis … Read more

Tackling Ransomware: Government’s New Proposals to Protect the UK Government’s Proposal
The UK government has recently announced a public consultation seeking views on three proposals aimed at striking a significant blow to the ransomware criminal business model. As outlined by the National Cyber Security Centre (NCSC), the consultation will consider three proposals: The ultimate goal is to protect UK CNI and the broader economy from the … Read more

NCSC Guidance: Building Resilient Operational Technology with Secure by Demand and Secure by Design Principles
Imagine trying to secure your home with a state-of-the-art alarm system while leaving a window open. This is the reality for many organisations today when it comes to their Operational Technology (OT) networks. Hackers have identified this gap and are increasingly exploiting OT systems, which are essential to industries such as energy, manufacturing, and transportation. … Read more

UK and EU Cybersecurity Legislation for 2025
2025 is shaping up to be a pivotal year for cybersecurity compliance in the UK and the EU. Businesses must prepare to align with new regulations designed to counter the evolving cyber threat landscape. With stricter requirements on the horizon, it’s essential to understand what these changes mean and how they will impact your operations. … Read more

Netflix Fined for Data Privacy Violation: A Warning for Data-Driven Businesses
Recent headlines have highlighted a significant privacy violation involving Netflix, resulting in a €4.75 million fine by the Dutch Data Protection Authority (DPA). The issue stemmed from Netflix’s failure to provide clear and sufficient information about how users’ personal data was processed between 2018 and 2020. The investigation revealed vague explanations of data use, sharing … Read more

The Widening Gap Between UK Cyber Risks and Preparedness: A Risk that Concerns the Nation’s Cyber Security Chief
Richard Horne, the head of the UK’s National Cyber Security Centre (NCSC), warned that the threats to the UK are wildly underestimated by both individuals and organisations. He stated that a sharp rise in severe cyber incidents, including attacks on healthcare, transportation, and other critical sectors, has become more frequent, sophisticated, and intense, as highlighted … Read more

The End of Passwords: Why Businesses Must Embrace Passkeys for Cybersecurity
Microsoft recently announced its intention to eliminate passwords for over a billion users worldwide, marking a pivotal shift toward secure, passwordless authentication. In light of this, businesses need to recognise the importance of modernising their security systems, as traditional passwords are no longer sufficient to combat evolving cyber threats. In 2024, password breaches surged by … Read more