Cyber security blog

The latest cyber security insight from CORVID

Managed Detection and Response (MDR) vs. Vulnerability Scanning

Managed Detection and Response (MDR) vs. Vulnerability Scanning

The world of cybersecurity is constantly evolving, with advanced technologies spearheading new ways to protect key assets from cyber threats....

Read More

What Is Managed Detection and Response (MDR)?

In today’s rapidly evolving cyber threat landscape, organisations need more than just conventional security measures. Introducing Managed Detection and Response (MDR) – a transformative solution to...

Read More

Cyber Incident Response for decision-makers

It is not unusual for an organisation to have a cybersecurity incident. It may be discovered through internal security controls (such as Anti-Virus, or a Security Operations Centre) , or it may be that a...

Read More

An introduction to cybersecurity for decision-makers

Cybersecurity is an industry, a field of academia, a buzz-word, a science, an art and a bogeyman. And whilst cybersecurity cannot be avoided within any organisation that relies upon computers and data: there...

Read More

Patching up life support: why critical care is at critical risk

Keeping people alive is unquestionably more important than patching software, but unpatched software is vulnerable to exploitation, and won’t keep anyone alive if it leads to a breach of your IT systems,...

Read More

Spotting a scam: Symptoms of a COVID-19 scam

Like the virus itself, scam emails claiming to be related to coronavirus are everywhere and spreading fast, preying on the public’s panic and an insatiable hunger for the latest information, government...

Read More

Happy to lose £300k to cyber crime? Get a university research partner

A higher education research partner has the potential to be hugely beneficial for your business, both financially and reputationally. But universities – especially the well-funded, prestigious Russell Group –...

Read More

3 ways your website is making it easy for attackers

Cyber attackers are quietly appreciative of businesses across all sectors for making their job easier. With all the information they need to craft their attack laid out neatly in front of them, adversaries...

Read More

Everything you need to know about a cyber security contract

Aside from the usual “strict diet and fitness regime starts on 1 January” resolution that everyone makes and forgets by February, now is the perfect time to take stock of your company’s cyber health. Was your...

Read More

It's nothing personal; cyber criminals just want your money

Disruptive ransomware attacks on manufacturing businesses regularly make headlines. You’ve seen the stories – multinational manufacturing companies are locked out of their IT systems, with attackers demanding...

Read More

Is your IP protected against the world's most formidable adversaries?

What if someone had stolen the designs for the first iPhone? Would you still fork out hundreds of pounds for the latest model, or would you buy the exact same handset for a mere fraction of the cost from...

Read More

Are you the middle man or the target?

Cyber criminals will always opt for the path of least resistance – targeting the weakest link in a supply chain gives them an easy route in to much bigger prey. Relying on hardware, software, and services from...

Read More