Cyber Security News and Advice

Making sense of Cyber Security for business owners

Cyber Criminals Are Constantly Adapting ... Are you? 
Bethany Faithfull Bethany Faithfull

Cyber Criminals Are Constantly Adapting ... Are you? 

Cyber criminals quickly react to changes in situation. How can you be sure that your business is protected, especially when the risks you’re facing could change suddenly due to a change in how the cyber criminals are operating?

Read More
Responding to a Cyber Incident
Bethany Faithfull Bethany Faithfull

Responding to a Cyber Incident

Only 21% of businesses have a formal incident response plan for how to act when a cyber incident does occur. It’s all well and good to say you will take action following a cyber incident, but what actions will you take?

Read More
We’re recruiting
Mark Faithfull Mark Faithfull

We’re recruiting

Doughnuts on your birthday is just one of the many benefits of working at Cool Waters Cyber as an apprentice

Read More
Solving the Cyber Skills Gap
Mark Faithfull Mark Faithfull

Solving the Cyber Skills Gap

Half of all UK organisations lack the basic cyber security skills to protect themselves according to a new government survey.

Read More
How to build a secure business
Mark Faithfull Mark Faithfull

How to build a secure business

Business and start-up owners often ask me what are the right tools and systems to use to build a secure business - this is what I tell them.

Read More
Certification Body status
Mark Faithfull Mark Faithfull

Certification Body status

We’re excited to share that we have achieved Cyber Essentials and Cyber Assurance Certification Body status - which means we can help clients to gain and retain these valuable certifications. We’re Cornwall’s only Certification Body!

Read More
What is Endpoint Protection?
Bethany Faithfull Bethany Faithfull

What is Endpoint Protection?

An Endpoint is any device that is connected to a network. This can include desktop computer, laptops, and mobile devices like phones and tablets. Endpoint Protection systems, also called Endpoint Detection and Response (EDR) solutions, take a holistic approach to your cyber security, offering security to the whole network and all connected endpoints.

Read More
What is SIEM? 
Bethany Faithfull Bethany Faithfull

What is SIEM? 

SIEM stands for Security Information and Event Management, and a SIEM system does exactly what you’d expect based on that name – it is software that manages security events and other important pieces of security information across the network it is installed on.

Read More
Fake Google Ads Used to Spread Malware 
Bethany Faithfull Bethany Faithfull

Fake Google Ads Used to Spread Malware 

Google Ads are a good source of advertising in order to increase the number of visitors to your website. However, cyber criminals are now abusing this system to create copies of legitimate websites that when visited install malware onto your computer.

Read More
How To Protect Your Business from Holiday Cyber Attacks 
Bethany Faithfull Bethany Faithfull

How To Protect Your Business from Holiday Cyber Attacks 

The holiday season brings more users to many websites, for shopping, media streaming, and online gaming. Cyber criminals can use this increase in website traffic to carry out targeted attacks on these websites, causing the site to run slowly, or crash completely. This sort of attack is called a Distributed Denial of Service (DDoS) attack.

Read More
What is Risk Management in Cyber Security?
Bethany Faithfull Bethany Faithfull

What is Risk Management in Cyber Security?

In cyber security, we discuss risk and risk management on a frequent basis. Read on to understand what risk is, and the simple things you can do to manage risk within your business.

Read More
Phishing Scams: The Evolving Cyber Threat
Bethany Faithfull Bethany Faithfull

Phishing Scams: The Evolving Cyber Threat

Phishing is a term used to describe cyber crime that targets victims via email, telephone, or text message. We hear it most in reference to malicious emails, where criminals are disguising themselves as legitimate companies to trick their victims into clicking on links in the email or open documents attached to the email.

Read More
What is Ransomware? And How to Protect Your Data
Bethany Faithfull Bethany Faithfull

What is Ransomware? And How to Protect Your Data

Ransomware is the biggest cyber threat facing most business owners in the UK today. A 2022 report states that 40% of cyber-attacks experienced by companies were ransomware attacks. Read on to understand what it is, and the surprisingly simple things you can do to protect your business from the risks of ransomware.

Read More