Keep up with the latest insights from the experts at Secarma via our blog. This space is a knowledge hub that features business security advice, a deep dive into large-scale cyber attacks, technical how-to’s, and much more.

If you’d like to collaborate with us on a blog, feel free to get in touch.

cybersecurity threat

New Year, New Cybersecurity Threat? …Not Exactly

For a lot of us, 2020 felt like it was never going to end, but now that unprecedented year is finall...

security training

Introducing Our New Security Training Courses

In the new year, we’re launching a hands-on training service that will help you learn more about o...

security

Remote Working Security Lessons to Take into 2021

As 2020 draws to a close, we’re probably not the only ones looking forward to kissing this year go...

Charity Support Fund

Secarma has today launched a £500,000 Support Fund to help charities protect themselves from cy...

Performing Internal Infrastructure Testing Remotely

In a new mini-series, Secarma’s Technical Director Holly Grace Williams, investigates how recent n...

Business Update: We’re Continuing to Provide You with Cybersecurity Solutions

In these unusual and uncertain times, we would like to reassure all of our clients that it is bu...

Security Protections: How Do You Lock Down Your Systems?

In part 1 of our 4-part series, we discussed how to evaluate your organisation’s security risks ...

Risk Management: What Are You Doing to Reduce the Risk of a Breach?

Modern cyber-attacks can target a wide range of aspects of an organisation, so it’s critical to en...

A Look at the History of Malware and a Prediction for the Future

On this week’s episode of Hacked Off, I talked about my love:hate relationship with malicious ...

Your Security Awareness Training Isn’t Working

Just 27% of businesses in the UK reported that staff had attended internal or external training on c...

Equifax Autopsy: What Have We Learned?

On September 7th 2017 Equifax, one of the largest credit agencies in the world, they announced t...

Preparing Yourself for a Successful Red Team

A successful cybersecurity assessment starts well before any report is delivered, even before tester...