Blog

We regularly post our thinking here because ideas are best shared. It might be our approach to solving a problem (we’re not fans of reinventing the wheel!), perhaps simply something else entirely that has piqued our interest!

You can join us at @cydeaHQ on Twitter, or our LinkedIn page to discuss any of our posts. If you’d like to know each time we add a new post, you can subscribe for notifications and a few other choice bits of content.

...
The maths explained series: compound risk calculations to show overall risk profiles

In What do you do when there’s more than one risk? I talked about why, when you want to consider multiple risks together, you can’t just add them together.

Continue reading...
...
Exploring the potential threats to multi-factor authentication

The limitations of Multi Factor Authentication Multi Factor Authentication (MFA) is something we hear about constantly. From securing personal accounts to protecting enterprise systems, the use of MFA has become widespread in order to protect personal and business data.

Continue reading...
...
Precision vs accuracy in risk assessments

The concept of precision versus accuracy comes up across many industries, and is ultimately the same set of principles used in relation to data and how it is used.

Continue reading...
...
What do you do when there’s more than one risk?

What do you do when there’s more than one risk? Let’s do a little thought experiment. Imagine that you’re in charge of controlling cyber security risks in your organisation, and that you can only afford to implement one control this quarter.

Continue reading...
...
Why is everyone talking about zero trust?

You might have heard people saying: “Never trust, always verify”. It suggests that, by default, users or devices should not be trusted, even if they have been verified previously.

Continue reading...
...
The human element in cyber risk

According to research by security firm Tessian and Professor Jeff Hancock, 88%** of data breaches take place due to employee errors.

Continue reading...
...
Even if your data’s in the cloud, its security is still your problem

“We don’t need to have our own encryption keys, all of our data is in the cloud.” Cloud services are a useful resource for shifting CapEx (capital expenditure) requirements to OpEx (operational expenditure).

Continue reading...
...
What is multi-factor authentication?

In today’s increasingly interconnected world, the need for robust cyber security has never been more critical. As cyber threats continue to evolve, organisations are looking at different ways to protect their digital assets.

Continue reading...
...
Testing your organisation's response to cyber incidents

It’s 7:30am. You wake up to 17 missed calls and a dozen messages from staff saying they’re locked out of their machines, and all they can see is a message asking for 50 bitcoins to decrypt the company’s data.

Continue reading...