More data is publicly available than ever before… And it’s a major cyber security risk

Whenever we first engage with organisations to help them optimise their cyber security posture, they’re often surprised at the number of hidden attack vectors that need to be given careful consideration. While the fundamentals of cyber best practice are well-documented at this point, new threats are constantly emerging, which means this is very much a […]
Does the humble USB drive still have a home in the modern workplace?

Formerly ubiquitous in the workplace, with their small size making them a useful way of transporting important files, there are growing cyber security concerns about USB drives and their usage.
The Unseen Cyber Security Challenge: Practical Steps to Protect Against Insider Threats

The range of potential cyberattacks continues to grow, but human error – both accidents and malicious acts – remains the main cause of data breaches for organisations, which means a new approach to cyber security is needed.
A fresh approach to DevSecOps reenergises application development for a Government department

A government organization partners with Xpertex to deliver a fully managed application development service, resulting in a more agile and dynamic approach to application development.
Empowering Inclusivity: Breaking Barriers with Software-Defined Networking

As software-defined networking solutions – such as SD-WAN, SASE, SD-LAN, and SD-DC – establish themselves, there are numerous opportunities to utilise their capabilities to develop a more inclusive technology workforce.
Xpertex Achieves Elite Plus Partner Status in the Juniper Networks Partner Advantage Program

Xpertex is recognised for Leadership in Sales, Customer Service Excellence, Technology Expertise and Security Specialisation, marking the next phase of commitment in providing enterprise businesses with AI-powered network security
The Threat of Phishing and the ‘Human Firewall’

Phishing is one of the most prevalent methods of breaching organisations’ cyber defences. You can have the best cyber security in the industry, but it only takes one ill-considered click and it’s all over. The ‘Human Firewall’ is your final line of defence when all other mechanisms have failed. If a phishing email is sitting in an employee’s inbox, it’s down to their security awareness to prevent disaster.
Smishing – learning to spot and secure against an emerging cyber threat

Anyone’s who’s used email over the years will be familiar the wide range of fake communications that encourage us to hand over our sensitive data – known as ‘phishing’ – and measures for identifying and securing against such communications are now an established part of cyber security best practice.
Confidence, Credibility, and World-class Security: Understanding the Cyber Essentials scheme

Cyber security is both more complex and more critical than ever before. For organisations ranging from start-ups to global leaders, an increasingly complex range of threats must be given careful consideration, as customers expect clear evidence that their sensitive data will always remain fully secure.
With so many factors to consider, and new ones appearing on a near-daily basis, developing robust cyber security can seem like an overwhelming prospect at first. Fortunately, the Cyber Essentials scheme provides a proven, recognised roadmap for establishing a true security culture within companies, helping them stay several steps ahead of global bad actors.
What is Breach & Attack Simulation, and Does it Mean the End for Traditional Penetration Testing?

I changed my mind on this (which doesn’t happen very often, but I will come back to that later)…
Breach & Attack Simulation (BAS) is an advanced security testing methodology that is designed to stress-test your cyber defences by launching ‘real’ cyber-attacks against your live systems, or a virtual representation of your technology infrastructure stack. When the results of this attack are analysed, any weaknesses will be highlighted, so they can resolved before a real-world attack takes advantage of them.