17 Mar 2026 | Blog, Cyber Security

The Cyber Threat

Howard Freeman

Howard Freeman

Woman in an office using a laptop. Paperwork, files and folders are on a desk and there is an image of a padlock on the laptop screen to represent cyber security.

Internet connectivity brings great benefits. However, this is also exploited by those wishing to cause harm. It is important to identify those threats and help protect your business.

Your prosperity depends on the internet. In an increasingly inter-connected world, the success of companies depends on the ability to operate effectively and safely online. The internet, and the wider networks that are connected to it, is an invisible – but crucial – aspect of everyday life.

However, alongside the opportunities there are risks. There are those out there that will use the internet to cause harm to you. This might be stealing banking details or valuable intellectual property from your business. They might even use it for the distribution of terrorist propaganda. This can have a real impact! You and your business will not want to be associated with that.

As a result, Cyber Security was identified as a Tier 1 threat in the National Security Strategy, alongside Terrorism, War and Natural Disasters.

How do you counter such threats?

“It’s not easy” is often the reply we receive when we ask clients this very question.

They are correct, it is not easy, but it is not impossible either. The best way forward is to build your defences and ensure they are tested and actually work for you. How is this done?

Well, GCHQ has suggested their 10 steps to Cyber Security which are listed below:

  1. Risk Management
  2. Engagement and Training
  3. Asset Management
  4. Architecture and Configuration
  5. Vulnerability Management
  6. Identity and Access Management
  7. Data Security
  8. Logging and Monitoring
  9. Incident Management 
  10. Supply Chain Security

When was the last time, if ever, have you tested yourself against this list? I mean REALLY tested your business. It is very easy to pay this lip service and tick some boxes. 

When we carry out Cyber Essentials assessments, we look at the answers provided very carefully. We often see companies contradict themselves. This tells us that they are carrying out a tick box exercise. This is not secure working, it is madness. It is also a Cyber Essentials failure. We don’t want to tell you that you are safe when you are not.

Call us or book an appointment and let’s have an honest conversation.

0 Comments

Can we help?