Our Blog

Interested in the latest developments in the security world, or just want to get a better understanding of our service lines then this is the place for you.
Secora Consulting’s blog is a mixture of news and developments in the security world and technical breakdowns of our services.
Bookmark this page to stay informed.

Top Cyber Security Threats to Financial Service Providers

Organisations within the financial services sector are at a high risk of cyber security attacks. This is primarily due to the large amount of highly sensitive, personally identifiable data collected, managed and stored on their systems.  The financial services sector arguably holds the most personally identifiable information (PII) than any other sector. From sensitive customer information, credit…

Strengthen Your Cyber Security Posture with Secora Consulting

Cyber attacks are on the rise and are quickly becoming more consistent and sophisticated. Whether you run a small business or a large multinational organisation, cyber security cannot be ignored. No organisation is too small, too large or too insignificant to escape the attention of cyber criminals.   In this ever evolving cyber threat landscape, the key to becoming cyber secure is to first…

Protecting Your Business From Social Engineering Attacks

When most people think of hackers, their minds immediately turn to the hoodie sporting loner, firing off high tech exploits to bring multinationals to their knees. But often, the most simple and effective tool in the arsenal of any hacker is that of social engineering. Verizon's yearly data breach investigations report concluded that 85% of data breaches involved a human element. In today’s blog…

Anatomy Of A Ransomware Attack

There is a notable increase in ransomware attacks within the last 12 months, with numerous organisations such as the Irish Health Service Executive (HSE) and Miami-based IT management company Kaseya both being targeted. Successful ransomware attacks often lead to financial gains for attackers. As rewards can be large, ransomware continues to evolve, becoming more advanced.  However, the more we…

Top Vendor Vulnerabilities - August and September 2021

Vendor Vulnerabilities are one of the most common cyber security challenges organisations face when introducing third party products to their network. Unless your organisation has the ability to develop your own networks, systems, websites and applications in-house, relying on third-party vendors is a necessity in day-to-day working life.  Relying on a third-party vendor not only means that you…

Begin your Cyber Security Journey with a Baseline Assessment

Often the most challenging step in assessing your organisation's cyber security stance is identifying the risks associated with your current network, systems, devices, websites and applications. A baseline assessment is the perfect starting point. It helps enable organisations to develop strong security controls and processes which are essential in building effective defenses against cyber…

Creating a Password Security Policy for Your Organisation

Password protection has been a main focus in cyber security education for almost as long as computers have been around. Passwords can be seen as the keys to the kingdom when it comes to an organisation's IT assets. When it comes to any physical assets, many organisations require employees to access their facilities using a key or key card. They have any open areas or vulnerable spaces monitored by…

The Top 5 Cyber Security Risks for Remote Employees

Remote working, whether full time or on a hybrid basis, can give cyber criminals the opportunity to exploit vulnerabilities in a more widespread fashion, if the correct security controls aren’t in place or are misconfigured. Cyber security incidents when remote working was a factor cost organisations €910,000 more than the average cost of a data breach at €3.62 million.  Additionally, the time it…

A Robust Cyber Security Framework for Credit Unions

We welcome the opportunity for you to learn more about how we can help you prepare for and align to the Central Banks IT security expectations. When you partner with us, we will provide your Credit Union with a bespoke independent third-party verification framework to ensure you comply with the Central Bank’s IT Governance and Risk Management requirements. Our framework is tailored to each Credit…

Secure your success.

Use a trusted security partner with experienced consultants, who want to ensure your long term success