Cyber Security Blogs

Bringing you the latest news from Transparity and the world of tech.

Ransomware on the rise

Ransomware On The Rise: Are You Protected?

Microsoft confirms “a massive growth trajectory for ransomware and extortion”, rising by 935% in 2021 alone
Trust Nobody Zero Trust Explained

Trust Nobody? Zero Trust Explained

Zero Trust is essential to your security - but what does it mean? We explore the components of Zero Trust and how you can get started.
Supply chain risk Transparity Cyber

Supply Chain Risk: Complex but Critical

Every organisation has a supply chain, but is yours putting you at risk of a breach? Here, we explore how to manage supply chain security.
Image-Is-your-Internet-of-Things-IoT-sleepwalking-into-a-security-breach-1

Is your Internet of Things (IoT) sleepwalking into a security breach?

IoT (Internet of Things) technology can dramatically expand your attack surface, and if not properly connected can have devastating results

OT (Operational Technology): A hacker’s favourite back door

Operational Technology (OT) when left unsecured can create the perfect back door for hackers to gain access to your environment.
Image-How-To-Plug-the-Security-Gaps-in-BYOD-1

How To Plug the Security Gaps in BYOD

BYOD or Bring Your Own Device can leave significant gaps and vulnerabilities in your security, here's how to stay secure.
Image-What-is-MFA-Push-Bombing-and-What-Can-You-Do-About-It-1

What is MFA Push Bombing and What Can You Do About It?

MFA push bombing is on the rise, using social engineering to attack and infiltrate systems. Here's how it works and what you can do about it.
Image-Multifactor-Authentication-now-1-1

3 reasons you need to start using Multifactor Authentication (MFA) – now

Multifactor Authentication is essential to your cybersecurity. Here are three reasons you should start using MFA to protect your business.
The-Supply-Chain_-Manufacturings-Unexpected-Security-Risk

The Supply Chain: Manufacturing’s Unexpected Security Risk

One vulnerability that may go overlooked, is the threat of a cyberattack gaining access to systems and data via supply chain partners.

Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397)

As part of our 24x7 threat intelligence activities, our experts have released a threat advisory. Read more here.

Transparity recognized with Microsoft verified Managed XDR (MXDR) solution status

We’re proud to announce we have achieved Microsoft verified Managed Extended Detection and Response (MXDR) solution status.

The UK Cyber Essentials Scheme – Our dedication to security

Our commitment to ongoing security and trust for our clients remains a continual high priority for us. As part of this dedication to instilling the greatest level of trust with our clients, we recently took part in the UK Cyber Essentials Plus Scheme.
[mwai_chatbot id="chatbot-8s20vg"]
Skip to content