The frozen middle and the tentacles of change: security-conscious transformation

In this blog, we highlight Liz Murray’s best insights from Stratia Cyber’s first-ever webinar ‘Why clear goals and a people-first approach lead to secure transformation’ In times of technological transformation, organisations need a non-executive director advocating for the change, says Liz Murray, Global Security Culture and Awareness Lead at FNZ.  Advocating for cybersecurity needs to come from a ‘non-technology person’ …

Watch here: ‘Why clear goals and a people-first approach lead to secure transformation’

Why does badging technological change as a ‘revolution’ lead to disaster? Why can a ‘frozen middle’ stop digital transformation in its tracks? And why would you delete ‘cyber’ from a job description?  All these questions are answered in Stratia Cyber’s first-ever webinar recorded on Thursday 10 November and, available to watch now for free, Why clear goals and a people-first …

Free webinar: Why clear goals and a people-first approach lead to secure transformation

How can companies handle the ‘people’ aspect of technological transformation? How do you set out a clear goal – and ensure everyone understands (and supports) it? And how do you stay secure in a time of change?  To answer these questions, Paul Maxwell, Director at Stratia Cyber, will be joined by two experts in technological transformation and security: James Findlay, …

What it’s really like to change career into cybersecurity

With high demand for cybersecurity professionals, the sector can be a tempting prospect to work in – but what’s it really like to change careers into cybersecurity?  One person who knows is Devina Patel, Associate Consultant at Stratia Cyber.  She took the plunge and changed careers from her previous customer service job via an intensive cybersecurity course – and hopes …

Five cybersecurity quick wins for small businesses

If you’re a small business owner, becoming more secure doesn’t need to mean devoting your whole life to it, or breaking the bank.  In fact, for just about any small business, there are a few simple steps which can help to keep your most valuable data (think invoices, orders or customer information) safe from the most common cyber threats. Most …

Uber hack: What you need to know about the data breach

When Uber issued a message saying, ‘We are currently responding to a cybersecurity incident’ it confirmed a New York Times story that a hacker claiming to be 18 years old had gained wide-ranging access to the company’s network.  The details of the attack are still not fully clear – but it’s been reported the hacker gained high-level privileges by compromising …

How to stay safe from hackers impersonating cyber security firms

Cybercriminals are impersonating cybersecurity firms in phishing emails where employees are instructed to call an enclosed phone number to perform a security check.  The latest ‘callback phishing’ attack appears to be from security vendor Crowdstrike, and directs employees to call what is supposedly a helpline.  Naturally, it’s not – and victims are instructed to install software which is a RAT …

Why we need to redefine the term ‘cyber’

“It’s time we shift the way we think about security and lock away any outdated perceptions of ‘cyber’. Security is the key to opening doors in today’s interconnected world.” Paul Maxwell, Director at Stratia Cyber The term cyber has always been an adjective. Merely a word to describe something that exists in what we once marvelled at as ‘cyberspace’. Why, …

Cyber security in healthcare: challenges and opportunities

Cyber security is now an essential part of doing business in the healthcare sector – our experts and clients explain why in this SC Insights | Magazine edition, part two in our healthcare series. From real-life accounts of how Stratia Cyber helped the NHS in Wales respond to the devastating WannaCry cyber attack, to guidance on how to build the …