Black Arrow Cyber Threat Intelligence Briefing 10 October 2025
Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.
Executive Summary
Our review of business and cyber security media this week highlights that cyber risk is escalating across finance, education and supply chains, with attacks growing in scale and sophistication. AI-driven threats and deepfake-enabled fraud are eroding traditional defences, while SaaS misconfigurations and legacy systems widen exposure.
Surveys reveal persistent gaps in budgets, skills and governance, leaving many organisations underprepared. Ransomware recovery rates are falling, and digital fraud now consumes a significant share of revenue.
Boards are under pressure to strengthen oversight and link leadership incentives to cyber performance, yet complacency remains a critical risk. In our work with business leaders across countries and sectors, we see the value of leaders taking command by understanding their risks and governing their resilience across people, operations and controls. Contact us to discuss how we can support your leadership through focused upskilling and governance support.
Top Cyber Stories of the Last Week
CFOs Put Cyber at the Top of the Risk Agenda
New research of UK finance leaders finds 99% experienced payments‑related cyber incidents in the past two years and 94% plan to raise cyber spend, with over half preparing a significant uplift. Accounts Payable automation is the top priority, yet 47% cite integration with existing systems as the main barrier and only 64% feel confident they have real‑time oversight. The findings underline the exposure created by legacy platforms and fragmented processes and the need for tighter controls, better visibility and stronger governance across finance operations.
SonicWall Cloud Backup Breach Exposes Firewall Configurations
SonicWall confirmed that an attacker accessed firewall configuration backup files for all customers who used its cloud backup service. While credentials in the files are encrypted, possession of configurations raises the risk of targeted exploitation. SonicWall, working with Mandiant, issued remediation guidance including comprehensive credential resets and prioritisation of internet‑facing devices.
Source: https://cyberscoop.com/sonicwall-customer-firewall-configurations-exposed/
Budgets and Skills Lag Behind Rising Attacks
ISACA’s latest survey reports 39% of European organisations are facing more attacks than a year ago, while only 38% are completely confident in detection and response. Despite incremental improvements, 58% remain understaffed and 54% say budgets are still insufficient. Stress and burnout persist, with 68% saying the job is more stressful than five years ago and 22% of organisations taking no action to address it. The data points to structural capability gaps that leadership must close to improve resilience.
SMBs Remain Exposed to AI‑Driven Threats and Ransomware Complacency
A new report highlights how AI is supercharging social engineering and malware while a complacency gap persists in smaller firms. Automated, highly personalised campaigns are raising the success rate of phishing and voice scams, and the financial fallout now stretches far beyond the ransom to business‑ending costs. The analysis argues that many SMBs still underestimate their exposure and need proactive, specialised security and clearer accountability for risk.
Digital Fraud Now Costs Firms an Average 7.7% of Revenue
TransUnion’s H2 2025 update estimates global businesses lost $534bn over the past year to digital fraud, with US firms averaging 9.8% of revenue. Account takeover has surged and is now the top driver of losses in the US at 31%, with smishing, phishing and vishing widespread. The findings reinforce the need for stronger identity assurance, layered controls and active monitoring of customer interactions across channels.
Source: https://www.infosecurity-magazine.com/news/digital-fraud-costs-companies/
Survey Finds Attacks Hit 91% of UK Universities and 43% of Businesses
A recent UK survey reveals that 91% of universities and 43% of businesses experienced cyberattacks in the past year, affecting over 600,000 businesses and 61,000 charities. The findings highlight widespread vulnerabilities across sectors, with education institutions particularly exposed due to legacy systems and limited cyber budgets. Despite the scale of attacks, many organisations remain underprepared, lacking robust incident response plans and adequate cyber insurance. Experts warn that complacency and outdated security practices are leaving critical data and operations at risk, urging leadership to prioritise cyber resilience and invest in modern defences.
Insurer Forecasts 40% Rise in Named Ransomware Victims by 2026
QBE warns leak‑site victims could exceed 7,000 by 2026, a 40% jump on 2024, with criminals exploiting cloud platforms and AI. Between 2023 and 2025 the UK accounted for 10% of significant incidents. Deepfakes featured in nearly 10% of cases in 2024 with wide‑ranging losses. The report stresses supply chain dependencies and the need for stronger oversight of third parties and recovery planning.
Paying Ransoms Increasingly Fails to Restore Data
A Veeam study finds only 32% of organisations that paid ransoms in 2024 recovered their data, down from 54% in 2023. 63% lack alternative infrastructure for site‑wide recovery. The report highlights data theft‑only tactics and the case for tested backups, segmented recovery and rehearsed decision‑making.
SaaS Incidents Surge Despite High Confidence
AppOmni’s 2025 study shows 75% of organisations suffered a SaaS incident in the past year while 91% felt confident in their posture. Incidents are often driven by permissions issues and misconfigurations, and accountability is fragmented across business units. The report calls for continuous oversight and independent validation of SaaS controls.
AI Supercharges Phishing and Stretches Defences
A Comcast report analysed 34.6 billion events, showing attackers scale noisy campaigns while running quiet intrusions in parallel. Generative AI makes it easier to craft realistic phishing attempts and malware, while shadow AI and non‑human identities widen exposure. Human fatigue and proxy abuse further erode traditional detection methods, strengthening the case for layered, behaviour‑based controls.
Source: https://www.helpnetsecurity.com/2025/10/06/phishing-ai-enterprise-resilience-security/
Deepfake Voice Risks Highlight Identity Verification Gaps
Microsoft halted its Speak for Me voice cloning test after concerns it could enable fraud through highly convincing impersonations. This highlights the dangers of implementing voice cloning without strong security and verification controls.
Source: https://www.darkreading.com/application-security/microsoft-voice-clone-scary-unsalvageable
Insurers and Asset Managers Expand Cybersecurity Oversight
Moody’s survey of 102 insurers and asset managers shows cyber security remains a top board-level priority. Budgets are rising, firms plan to hire specialists, and advanced defence strategies are being adopted. Oversight is strengthening, with 40% now linking CEO pay to cyber performance goals, up from 24% in 2023. Regional gaps persist in third-party risk management, AI governance, and cyber insurance coverage. Most respondents maintain vendor risk programmes, and over 80% have AI policies. Cyber insurance adoption is highest in the Americas, and 21% plan to increase coverage limits in 2025.
Governance, Risk and Compliance
Cybersecurity Tops CFO’s Risk Agenda With 99% Reporting Incidents and 94% Planning to Increase Spend
The cost of cyber hacking on UK business is greater than it seems - BBC News
Overconfidence major cyber risk for business – report
Six metrics policymakers need to track cyber resilience - Help Net Security
The Evolving Role of the CSO: From Technical Guardian to Business Strategist - Security Boulevard
NCSC: Observability and Threat Hunting Must Improve - Infosecurity Magazine
Cyber Risks Can Be Legal Risks: How to Protect the Organization | Security Magazine
Threats
Ransomware, Extortion and Destructive Attacks
Many businesses paying a ransomware demand don't get their data back | TechRadar
Ransomware Group “Trinity of Chaos” Launches Data Leak Site - Infosecurity Magazine
Ransomware attacks to surge 40% by 2026 amid AI and cloud vulnerabilities: QBE - Reinsurance News
29% of businesses that paid cyber attack ransoms still had their data leaked
Active Ransomware Groups Reach an All-Time High, GuidePoint Security Finds
SMBs vulnerable to AI-powered cyberattacks and complacent about ransomware - BetaNews
Hackers launch data leak site to extort 39 victims, or Salesforce - Help Net Security
Salesloft hackers outsourcing ransom negotiations for $10 • The Register
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Ransomware Attacks Skyrocket, Forcing Companies to Confront a Vexing Question | Law.com
Cybersecurity Needs A Supply Chain Perspective: JLR attack Shows Why
Google says 'likely over 100' affected by Oracle-linked hacking campaign | Reuters
Oracle links Clop extortion attacks to July 2025 vulnerabilities
Oracle tells Clop-targeted EBS users to apply July patch • The Register
Microsoft: Critical GoAnywhere bug exploited in ransomware attacks
Red Hat data breach escalates as ShinyHunters joins extortion
Salesforce refuses to pay ransom over widespread data theft attacks
Inside the 'Trinity of Chaos' group of young hackers targeting major companies - ABC News
Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses
XWorm malware resurfaces with ransomware module, over 35 plugins
Teens arrested in London preschool ransomware attack • The Register
Chaos Ransomware Upgrades With Aggressive New Variant
Hackers now use Velociraptor DFIR tool in ransomware attacks
Ransomware Victims
Hackers hold 1 billion customer records to ransom | The Independent
The cost of cyber hacking on UK business is greater than it seems - BBC News
Salesforce refuses to pay ransomware crims' extortion demand • The Register
Jaguar Land Rover Shows Cyberattacks Mean Business
Japan’s Asahi ships beer manually after ransomware attack | The Straits Times
Jaguar Land Rover expected to restart some production after cyber-attack - BBC News
Aston Martin warns of disruption in wake of JLR cyber attack
JLR counts cost of cyber hack with UK retail sales down 32% | Manufacturer News
Co-op set to reveal financial toll caused by cyberattack | The Independent
Teens arrested in London preschool ransomware attack • The Register
Phishing & Email Based Attacks
SpamGPT - When Phishing Gets a Marketing Degree - Security Boulevard
Phishing Is Only the Tip of Cybersecurity’s AI Arms Race | MSSP Alert
Phishing is old, but AI just gave it new life - Help Net Security
New ‘point-and-click’ phishing kit simplifies malicious attachment creation | SC Media
How Phishing Kits Are Evading Detection & Ways to Beat Them | MSSP Alert
APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
Why Brand Impersonation Is A Marketing Crisis, Not Just A Cybersecurity Problem
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Other Social Engineering
North Korean hackers stealing record sums, researchers say - BBC News
New FileFix attack uses cache smuggling to evade security software
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers
Fraud, Scams and Financial Crime
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue - Infosecurity Magazine
Brazilian scammers, raking in millions, used Gisele Bundchen deepfakes on Instagram ads | Reuters
Former Tory council leader on trial over alleged romance fraud - BBC News
Artificial Intelligence
SMBs vulnerable to AI-powered cyberattacks and complacent about ransomware - BetaNews
SpamGPT - When Phishing Gets a Marketing Degree - Security Boulevard
Phishing Is Only the Tip of Cybersecurity’s AI Arms Race | MSSP Alert
Phishing is old, but AI just gave it new life - Help Net Security
APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails
Ransomware attacks to surge 40% by 2026 amid AI and cloud vulnerabilities: QBE - Reinsurance News
Microsoft's Voice Clone Becomes Scary & Unsalvageable
FraudGPT and WormGPT, are now available on dark net forums for as low as $100 - The420.in
AI is making cybercriminal workflows more efficient too, OpenAI finds | ZDNET
Two-thirds of bank staff using unapproved AI tools - survey
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
Cybersecurity’s next test: AI, quantum, and geopolitics - Help Net Security
Employees regularly paste company secrets into ChatGPT • The Register
How Your AI Chatbot Can Become a Backdoor | Trend Micro (US)
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
What CISOs should know about DeepSeek cybersecurity risks | TechTarget
Brazilian scammers, raking in millions, used Gisele Bundchen deepfakes on Instagram ads | Reuters
Take Note: Cyber-Risks With AI Notetakers
CometJacking: One Click Can Turn Perplexity's Comet AI Browser Into a Data Thief
ICO’s £7.5m Clearview AI Fine a Step Closer After Legal Victory - Infosecurity Magazine
Malware
APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails
Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks - SecurityWeek
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
New FileFix attack uses cache smuggling to evade security software
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
Hackers Exploit RMM Tools to Deploy Malware - InfoRiskToday
From infostealer to full RAT: dissecting the PureRAT attack chain
BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers
XWorm malware resurfaces with ransomware module, over 35 plugins
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT
Self-Propagating Malware Hits WhatsApp Users in Brazil
Bots/Botnets
RondoDox botnet fires 'exploit shotgun' at edge devices • The Register
The architecture of lies: Bot farms are running the disinformation war - Help Net Security
Mobile
Google Pixel October security patch continues to fix haunting display problems | Android Central
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
Self-Propagating Malware Hits WhatsApp Users in Brazil
Denial of Service/DoS/DDoS
Telco biz ICUK restores services after two-day DDoS pelting • The Register
Internet of Things – IoT
Connected devices in the workplace: innovation or a gateway for cyberattacks?
Building owners face up to growing cyber threat
How to protect your car from hacking | Kaspersky official blog
Data Breaches/Leaks
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk
Google says 'likely over 100' affected by Oracle-linked hacking campaign | Reuters
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
Discord discloses data breach after hackers steal support tickets
Hackers claim Discord breach exposed data of 5.5 million users
Renault warns UK customers after cyberattack exposes data
Military radio maker BK Technologies cops to cyber break-in • The Register
Electronics giant Avnet confirms breach, says stolen data unreadable
Dutch travel company refuses compensation after cyberattack exposes customer data | NL Times
Data Breach at Doctors Imaging Group Impacts 171,000 People - SecurityWeek
Sunweb confirms data breach, warns customers to be on their guard | TechRadar
DraftKings warns of account breaches in credential stuffing attacks
Boyd Gaming sued by employee over data breach | Cybernews
Organised Crime & Criminal Actors
Europol Calls for Stronger Data Laws to Combat Cybercrime - Infosecurity Magazine
Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain
North Korean hackers stole $2 billion in crypto this year: report - UPI.com
Kremlin-backed crypto coin moves $6bn despite US sanctions
Politics Home Article | UK Faces Diplomatic Battle Over £5.5bn Bitcoin Claim
Insider Risk and Insider Threats
Employees regularly paste company secrets into ChatGPT • The Register
Insurance
Cyber cover concerns remain for risk managers – FERMA
Cyber insurance should complement, not replace, cybersecurity: FERMA - Reinsurance News
Impacts of Cyber Threat Landscape on Insurers and Policyholders | Gray Reed - JDSupra
Why cyber-security insurance matters for charities | Third Sector
Supply Chain and Third Parties
Cybersecurity Needs A Supply Chain Perspective: JLR attack Shows Why
The cost of cyber hacking on UK business is greater than it seems - BBC News
Cyber-Attack Contributes to Huge Sales Drop at JLR - Infosecurity Magazine
Cloud/SaaS
Ransomware attacks to surge 40% by 2026 amid AI and cloud vulnerabilities: QBE - Reinsurance News
Hackers claim Discord breach exposed data of 5.5 million users
Discord Says 70,000 Users Had IDs Exposed in Recent Data Breach - SecurityWeek
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
Microsoft 365 outage blocks access to Teams, Exchange Online
Outages
Microsoft 365 outage blocks access to Teams, Exchange Online
Azure outage blocks access to Microsoft 365 services, admin portals
Encryption
Cybersecurity’s next test: AI, quantum, and geopolitics - Help Net Security
Passwords, Credential Stuffing & Brute Force Attacks
GreyNoise detects 500% surge in scans targeting Palo Alto Networks portals
Massive surge in scans targeting Palo Alto Networks login portals
DraftKings warns of account breaches in credential stuffing attacks
Social Media
Brazilian scammers, raking in millions, used Gisele Bundchen deepfakes on Instagram ads | Reuters
LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data
Malvertising
Brazilian scammers, raking in millions, used Gisele Bundchen deepfakes on Instagram ads | Reuters
Regulations, Fines and Legislation
Europol Calls for Stronger Data Laws to Combat Cybercrime - Infosecurity Magazine
Invite us to your cyber war games, Finra urges members - Risk.net
German government says it will oppose EU mass-scanning proposal | CyberScoop
ICO’s £7.5m Clearview AI Fine a Step Closer After Legal Victory - Infosecurity Magazine
Federal judiciary touts cybersecurity work in wake of latest major breach | CyberScoop
State Cyber Teams Brace for Impact of US Government Shutdown
Federal shutdown deals blow to already hobbled cybersecurity agency
UK government says digital ID won't be compulsory – honest • The Register
Careers, Working in Cyber and Information Security
How to succeed at cybersecurity job interviews - Help Net Security
Law Enforcement Action and Take Downs
Teens arrested in London preschool ransomware attack • The Register
Arrests Underscore Fears of Teen Cyberespionage Recruitment
Politics Home Article | UK Faces Diplomatic Battle Over £5.5bn Bitcoin Claim
Former Tory council leader on trial over alleged romance fraud - BBC News
Misinformation, Disinformation and Propaganda
The architecture of lies: Bot farms are running the disinformation war - Help Net Security
Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity
Cyber Warfare and Cyber Espionage
China Is Joining Russia’s Shadow War on Europe - Bloomberg
Russia: already at war with Europe? | The Week
"We are already in the middle of a cyber war” - NATO expert warns - 08.10.2025 | BURSA.RO
Russia waging ‘grey-zone campaign’ and Europe must meet challenge, says EU chief
Nation State Actors
Cybersecurity’s next test: AI, quantum, and geopolitics - Help Net Security
China
China Is Joining Russia’s Shadow War on Europe - Bloomberg
Security Firm Exposes Role of Beijing Research Institute in China's Cyber Operations - SecurityWeek
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
China-linked hacking fears over Cisco devices in offices
PRC Gov't Fronts Trick the West to Obtain Cyber Tech
What CISOs should know about DeepSeek cybersecurity risks | TechTarget
Law firm representing big-name politicians hit with major hack from China: report - Raw Story
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
Most telcos have been hit by Salt Typhoon-style attacks
No 10 denies government involved in collapse of China spying case - BBC News
Russia
Russia: already at war with Europe? | The Week
"We are already in the middle of a cyber war” - NATO expert warns - 08.10.2025 | BURSA.RO
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
Russia waging ‘grey-zone campaign’ and Europe must meet challenge, says EU chief
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
China Is Joining Russia’s Shadow War on Europe - Bloomberg
Arrests Underscore Fears of Teen Cyberespionage Recruitment
Kremlin-backed crypto coin moves $6bn despite US sanctions
Cooper’s £4m plan to turn tables on Russian hackers
New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT
North Korea
North Korean hackers stole $2 billion in crypto this year: report - UPI.com
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
Tools and Controls
Cyber cover concerns remain for risk managers – FERMA
Cyber insurance should complement, not replace, cybersecurity: FERMA - Reinsurance News
Invite us to your cyber war games, Finra urges members - Risk.net
GreyNoise detects 500% surge in scans targeting Palo Alto Networks portals
Hackers Exploit RMM Tools to Deploy Malware - InfoRiskToday
Why Brand Impersonation Is A Marketing Crisis, Not Just A Cybersecurity Problem
Cybersecurity Tops CFO’s Risk Agenda With 99% Reporting Incidents and 94% Planning to Increase Spend
Six metrics policymakers need to track cyber resilience - Help Net Security
NCSC: Observability and Threat Hunting Must Improve - Infosecurity Magazine
Hundreds of free VPNs offer 'no real privacy at all,' researchers warn - does yours? | ZDNET
Are VPNs Under Attack? An Anti-Censorship Group Speaks Out - CNET
How CISOs can get out of security debt and why it matters | TechTarget
Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses
Take Note: Cyber-Risks With AI Notetakers
Edge device security: The frontline of your network - Security Boulevard
Google's New AI Doesn't Just Find Vulnerabilities — It Rewrites Code to Patch Them
Reports Published in the Last Week
Comcast Business Releases 2025 Cybersecurity Threat Report Analyzing 34.6 Billion Events
Other News
Cybersecurity concerns on the rise for consumers
Nearly half of Brits now talk cybersecurity over the kitchen table, research by Mastercard finds
Invite us to your cyber war games, Finra urges members - Risk.net
How CISOs can get out of security debt and why it matters | TechTarget
Experts Warn The Internet Will Go Down In A Big Way — And You'd Better Be Ready
Microsoft: Hackers target universities in “payroll pirate” attacks
ING's CISO on How Emerging Tech and Regulations are Reshaping Cybersec - Infosecurity Magazine
Stop trusting your ISP's router blindly
Hacktivists target critical infrastructure, hit decoy plant
Securing the final frontier: the new legal urgency of cyber security in space
Vulnerability Management
Vulnerabilities
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks
CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks
Microsoft: Critical GoAnywhere bug exploited in ransomware attacks
Zimbra users targeted in zero-day exploit using iCalendar attachments
Google Pixel October security patch continues to fix haunting display problems | Android Central
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation - SecurityWeek
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
7-Zip Vulnerabilities Let Attackers Execute Arbitrary Code Remotely
Google won’t fix new ASCII smuggling attack in Gemini
CometJacking: One Click Can Turn Perplexity's Comet AI Browser Into a Data Thief
CVE-2025-5947: WordPress Plugin flaw lets hackers access Admin accounts
Sector Specific
Industry specific threat intelligence reports are available.
Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.
· Automotive
· Construction
· Critical National Infrastructure (CNI)
· Defence & Space
· Education & Academia
· Energy & Utilities
· Estate Agencies
· Financial Services
· FinTech
· Food & Agriculture
· Gaming & Gambling
· Government & Public Sector (including Law Enforcement)
· Health/Medical/Pharma
· Hotels & Hospitality
· Insurance
· Legal
· Manufacturing
· Maritime & Shipping
· Oil, Gas & Mining
· OT, ICS, IIoT, SCADA & Cyber-Physical Systems
· Retail & eCommerce
· Small and Medium Sized Businesses (SMBs)
· Startups
· Telecoms
· Third Sector & Charities
· Transport & Aviation
· Web3
Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.
Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.
You can also follow us on Facebook, Twitter and LinkedIn.
Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.