The Security Knowledge Centre and Blog

This blog explores the latest and most impactful trends in the Cyber Security industry that are shaping the future of businesses.

Blog Image

August 14, 2025

What is Penetration Testing? A Comprehensive Guide

Penetration testing simulates real-world cyberattacks to uncover vulnerabilities before malicious hackers can exploit them. This article explains the types of pen testing, the process, and why it’s essential for strengthening your organisation’s cyber defences.

Read More
David Riley
Blog Image

August 1, 2025

Safeguarding Your Work-From-Home Environment: Understanding Endpoint Security Risks

Remote Work & Endpoint Security: Key Risks and How to Stay Protected As remote work becomes the norm, securing personal and work devices is critical. This blog highlights the top risks—like phishing, weak passwords, unpatched software, and unsecured networks—and offers practical steps for individuals and organisations to strengthen endpoint security and safeguard data in a remote environment.

Read More
Blog Image

August 6, 2025

How secure is my password?

Strong passwords and Multi-Factor Authentication are still your best defence against cyber threats. This blog explores what makes a secure password, why reuse is risky, and how password managers like LastPass can help protect your accounts. Connect with Kris to learn more.

Read More
Blog Image

August 6, 2025

Why ISO27001 Matters: More Than Just Compliance

ISO 27001 is more than a compliance exercise—it’s a powerful framework for building real security, reducing risk, and earning client trust. This blog explores how ISO 27001 drives long-term value by helping your organisation stay secure, resilient, and competitive in a fast-changing threat landscape.

Read More
Blog Image

August 6, 2025

What Is an Acceptable Use Policy (AUP)?

An Acceptable Use Policy (AUP) sets clear expectations for how employees should use company IT resources, helping reduce risk and support ISO 27001 compliance. This blog explains why an AUP matters, what to include, and how to make it effective across your organisation.

Read More
Blog Image

August 6, 2025

Why Are You Really Implementing That Annex A Control?

Not all ISO 27001 controls add real security value—and a legal register is a prime example. This blog challenges the habit of ticking boxes for compliance and encourages a more strategic, security-focused approach to Annex A. Want to share your take? Connect with Kris on LinkedIn.

Read More