
Rhys explains LARPing
My name’s Rhys Parsons, I work as a GRC (Governance, Risk and Compliance Analyst) for Siker, however I’ve been asked to discuss some of my
My name’s Rhys Parsons, I work as a GRC (Governance, Risk and Compliance Analyst) for Siker, however I’ve been asked to discuss some of my
Many if not all businesses share some degree of similarity with one another even with their primary process being separate. Be it a car manufacturing
Late on Monday night, reports emerged of an attempted attack on a city in Florida’s water supply. It is the latest in an increasing number
Home Smart Devices Smart speakers (or voice-enabled assistants) can perform many different services, triggered by voice commands from the user including, but not limited to, playing
What is a CTF? CTF stands for Capture the Flag. In the Cyber Security world this relates to an event where the aim is to hack
By now most people will have used or at least heard of Zoom and subsequently some of the privacy and security issues that have been brought
The spread of Coronavirus has now made it an increasingly common topic which criminals are attempting to exploit for their own gain. These attacks are
Redcar and Cleveland Council were attacked with ransomware on Saturday, February 8th. The council website is still not fully operational today, and this is only one of the
How setting up 2FA can help protect your online accounts, even if your password is stolen. This guidance explains how you can set up two-factor
Summary Mobile working and remote system access offers great business benefits but exposes new risks that need to be managed. You should establish risk based