<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>34ce9c05</title>
    <link>https://www.cybermethods.co.uk</link>
    <description />
    <atom:link href="https://www.cybermethods.co.uk/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Leading through a cyber crisis – strategies for CEOs</title>
      <link>https://www.cybermethods.co.uk/leading-through-a-cyber-crisis-strategies-for-ceos</link>
      <description>How do you lead your company through a cyber incident? If you are responsible for protecting your organisation from cyber threats and creating a culture of cyber awareness and accountability in your organisation, I am aware of how challenging this can be.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How do you lead your company through a cyber incident?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Leading-through-a-cyber-crisis-strategies-for-ceos.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are responsible for protecting your organisation from cyber threats and creating a culture of cyber awareness and accountability in your organisation, I am aware of how challenging this can be.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber attacks are a reality for every business
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , no matter the size or sector. They can 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           disrupt your operations, damage your reputation, and cost you money
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . That’s why you need to be prepared to respond quickly and effectively to a cyber incident, and not leave it to your IT team alone.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A cyber security incident isn’t just a cyber security problem, it’s 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           also a business continuity and communications issue, and can be a financial and legal one too
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Empowering and appropriately equipping the organisational leadership team plays a vital role in ensuring that your company can recover from a cyber incident; minimising the impact on your customers, partners, and stakeholders.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The National Cyber Security Centre (NCSC) has recently published a guide for CEOs on how to respond to a cyber incident and it is well worth reading as it covers the key steps you need to take, such as:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            establishing a cyber incident response team and assigning roles and responsibilities
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            communicating effectively with your internal and external audiences
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            identifying the cause and scope of the incident and containing the threat
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            restoring your normal operations and learning from the incident.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can review the NCSC’s guide for CEOs 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/guidance/ceos-responding-cyber-incidents" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As a leader of your organisation, you have a responsibility to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ensure that your company is prepared for any cyber threats that may arise
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Reviewing your security posture and incident response capabilities can help you identify and address any gaps or weaknesses that could put your business at risk allowing you to:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            enhance your resilience and agility in the face of unpredictable and evolving cyber attacks
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            reduce the potential impact and cost of a cyber incident on your operations, customers, and reputation
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            strengthen your trust and credibility with your stakeholders, regulators, and the public
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            align your security strategy with your business objectives and priorities
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            foster a culture of cyber awareness and accountability within your organisation.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to learn more about effectively responding to a cyber incident and what steps to take before, during, and after an attack, you can review my recent 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/posts/gareth-jones-83967151_methodsforgood-cybersecurity-cybersecurityawareness-activity-7172865539197898752-0Mv1/?utm_source=share&amp;amp;utm_medium=member_desktop" target="_blank"&gt;&#xD;
      
           LinkedIn post
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            or get in touch with me on 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:cyber@methods.co.uk" target="_blank"&gt;&#xD;
      
           cyber@methods.co.uk
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Leading-through-a-cyber-crisis-strategies-for-ceos.jpg" length="181817" type="image/jpeg" />
      <pubDate>Wed, 17 Apr 2024 09:19:08 GMT</pubDate>
      <author>it@methods.co.uk (IT Support)</author>
      <guid>https://www.cybermethods.co.uk/leading-through-a-cyber-crisis-strategies-for-ceos</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Leading-through-a-cyber-crisis-strategies-for-ceos.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Leading-through-a-cyber-crisis-strategies-for-ceos.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Gunpowder, treason, and secure social media!</title>
      <link>https://www.cybermethods.co.uk/gunpowder-treason-and-secure-social-media</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Gunpowder, treason, and
            &#xD;
      &lt;br/&gt;&#xD;
      
           secure social media!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Bonfire+Night.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With Bonfire Night around the corner and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.socialmediakindnessday.com/" target="_blank"&gt;&#xD;
      
           Social Media Kindness Day
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            on November 9th, we are highlighting the importance of a secure online presence to ensure your privacy doesn’t go up in smoke!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Keep your online presence burning bright on Bonfire Night with these five handy social media security tips:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            use strong passwords and activate multi-factor authentication
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            set accounts to private and adjust privacy for total control
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            lock or log off to prevent unauthorised access
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            block spam and unwelcome connections
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            verify links’ authenticity to dodge phishing risks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/social+media+tips.png"/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Bonfire+Night.png" length="266330" type="image/png" />
      <pubDate>Thu, 02 Nov 2023 11:51:27 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/gunpowder-treason-and-secure-social-media</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Bonfire+Night.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Bonfire+Night.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Gareth Jones receives ‘Chartered’ title in Cyber Security Governance and Risk Management</title>
      <link>https://www.cybermethods.co.uk/gareth-jones-receives-chartered-title-in-cyber-security-governance-and-risk-management</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Gareth Jones receives ‘Chartered’ title in Cyber Security Governance and Risk Management
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Gareth+Jones_500x500.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are delighted to share the exciting news that our Chief Information Security Officer, Gareth Jones, has earned the professional designation of ‘
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ukcybersecuritycouncil.org.uk/professional-standards/" target="_blank"&gt;&#xD;
      
           Chartered
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ‘ within the domain of Cyber Security Governance and Risk Management, by 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ukcybersecuritycouncil.org.uk/professional-standards/the-council-s-route-to-chartership/" target="_blank"&gt;&#xD;
      
           The UK Cyber Security Council
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This prestigious title is a testament to Gareth’s exceptional expertise in the intricate world of cyber security, highlighting his leadership in managing cyber-related engagements, his invaluable contributions to the broader profession, and his profound grasp of associated specialised fields. It is a recognition of his exceptional commitment and dedication to the cyber security industry.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Well done Gareth!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Gareth+Jones_500x500.jpg" length="27083" type="image/jpeg" />
      <pubDate>Wed, 01 Nov 2023 11:02:39 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/gareth-jones-receives-chartered-title-in-cyber-security-governance-and-risk-management</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Gareth+Jones_500x500.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Creep away ghostly glitches</title>
      <link>https://www.cybermethods.co.uk/creep-away-ghostly-glitches</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Creep away ghostly glitches
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Rounding up our tips and guidance across this 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nist.gov/cybersecurity/cybersecurity-awareness-month" target="_blank"&gt;&#xD;
      
           Cyber Security Awareness Month
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , our final blog focuses on the importance of installing and performing software updates regularly. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Vulnerabilities in software are becoming more common than ever, with the move to more frequent use of network connected devices, from electric cars to smart speakers, smart washing machines, and doorbells! 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/creep-away-ghostly-glitches---infographic.png"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Unpatched vulnerabilities can put your and your organisation’s data at risk! 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Methods is here to help protect your organisation from dangerous security vulnerabilities.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/creep+away+ghostly+glitches+-+header.png" length="188843" type="image/png" />
      <pubDate>Tue, 31 Oct 2023 12:43:29 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/creep-away-ghostly-glitches</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/creep+away+ghostly+glitches+-+header.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/creep+away+ghostly+glitches+-+header.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Ghoul-proof passwords</title>
      <link>https://www.cybermethods.co.uk/ghoul-proof-passwords</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ghoul-proof passwords
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           #Cybersecurityawarenessmonth
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As part of 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nist.gov/cybersecurity/cybersecurity-awareness-month" target="_blank"&gt;&#xD;
      
           Cyber Security Awareness Month
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            , this week we are highlighting the importance of ‘Ghoul-Proof Passwords’! 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Over 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.infosecurity-magazine.com/blogs/your-employees-reusing-passwords/" target="_blank"&gt;&#xD;
      
           65% of accounts
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            use duplicated passwords! Meaning if a bad actor gains the password of an employee’s email account, there’s a 65% chance they can access other accounts using the same password! 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/tricks+-+treats+for+ghoul-proof+passwords.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods are here to help your business establish best practices around data, account, and personal security. Find out more about our broad range of Cyber Security offerings 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cybermethods.co.uk/" target="_blank"&gt;&#xD;
      
           here.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/ghoul-proof-passwords-header-1c750666.png" length="134969" type="image/png" />
      <pubDate>Tue, 24 Oct 2023 13:32:04 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/ghoul-proof-passwords</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/ghoul-proof+passwords+header.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/ghoul-proof-passwords-header-1c750666.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Beware Strange-r Links</title>
      <link>https://www.cybermethods.co.uk/beware-strange-r-links</link>
      <description>Continuing on with Cyber Security Awareness Month… this week we are discussing ‘Strange-r Links’!
Cyber attacks are one of the fastest-growing problems faced by businesses across the world. 79% of UK businesses that reported a cyber-attack in 2023 identified receiving phishing emails.
Methods are here to help secure your business against phishing attacks and other cyber threats. Find out more about our broad range of Cyber Security offerings here.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Beware Strange-r Links
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/beware-stranger-links-filled.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Continuing on with Cyber Security Awareness Month… this week we are discussing ‘Strange-r Links’!
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber attacks are one of the fastest growing problems faced by businesses across the world. 79% of UK businesses that 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023" target="_blank"&gt;&#xD;
      
           reported
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            a cyber-attack in 2023 identified receiving phishing emails.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods are here to help secure your business against phishing attacks and other cyber threats. Find out more about our broad range of Cyber Security offerings 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cybermethods.co.uk/" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/stranger-links-phishing-types.png"/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/beware-stranger-links-filled.png" length="211186" type="image/png" />
      <pubDate>Mon, 16 Oct 2023 13:26:58 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/beware-strange-r-links</guid>
      <g-custom:tags type="string">phishing,cyber</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/beware-stranger-links-filled.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/beware-stranger-links-filled.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Security Awareness Month is here!</title>
      <link>https://www.cybermethods.co.uk/cyber-security-awareness-month-is-here</link>
      <description>This month is the 20th anniversary of NIST’s Cyber Security Awareness Month. To highlight the importance of good security practices, we will be bringing you a series of terrifyingly useful blogs and guidance.
Let’s make this Cyber Security Awareness Month the spookiest one yet for cyber-ghouls by staying safe and secure online! You can learn more about Cyber Security Awareness Month here.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber Security Awareness Month is here!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This month is the 20th anniversary of 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nist.gov/cybersecurity/cybersecurity-awareness-month" target="_blank"&gt;&#xD;
      
           NIST’s
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Cyber Security Awareness Month. To highlight the importance of good security practices, we will be bringing you a series of terrifyingly useful blogs and guidance.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let’s make this Cyber Security Awareness Month the spookiest one yet for cyber-ghouls by staying safe and secure online!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can learn more about Cyber Security Awareness Month 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nist.gov/cybersecurity/cybersecurity-awareness-month" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Scare hackers away with the power of MFA!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This week we will focus on the importance of preventing unauthorised access by enabling Multi-Factor Authentication. Multi-Factor Authentication, or MFA, is a common method used to prevent eerie intruders from accessing sensitive information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Common authentication methods used today include biometric authentication using either fingerprint or facial recognition and single use codes to authenticate to systems, services, and apps. Multi-Factor Authentication adds an additional layer of security for your devices and ensures only authorised individuals can access sensitive information and accounts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/MFA+halloween+design+-+external.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      
           Enabling MFA on your devices will help to keep the cyber-ghouls at bay! If you would like more advice and guidance on how MFA can prevent unauthorised access, please click 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://staysafeonline.org/online-safety-privacy-basics/multi-factor-authentication/" target="_blank"&gt;&#xD;
      
           this link
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/MFA+Benefits+poster+-+external+halloween+design.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stay tuned for next week’s blog…
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Happy-Cyber-Awareness-month.png" length="4438387" type="image/png" />
      <pubDate>Thu, 12 Oct 2023 09:22:14 GMT</pubDate>
      <author>it@methods.co.uk (IT Support)</author>
      <guid>https://www.cybermethods.co.uk/cyber-security-awareness-month-is-here</guid>
      <g-custom:tags type="string">cyber</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Happy+Cyber+Awareness+month.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Happy-Cyber-Awareness-month.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>With cyber attacks increasing 28% YoY and insurance premiums skyrocketing, organisations must reassess their supply chains to meet stricter guidelines</title>
      <link>https://www.cybermethods.co.uk/with-cyber-attacks-increasing-28-yoy-and-insurance-premiums-skyrocketing-organisations-must-reassess-their-supply-chains-to-meet-stricter-guidelines</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With cyber attacks increasing 28% YoY and insurance premiums skyrocketing, organisations must reassess their supply chains
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber attacks are one of the fastest growing problems faced by businesses in the UK and worldwide. According to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://blog.checkpoint.com/2022/10/26/third-quarter-of-2022-reveals-increase-in-cyberattacks/" target="_blank"&gt;&#xD;
      
           Checkpoint
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , the number of global 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           cyber attacks has increased by 28%
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            in the third quarter of 2022, compared to the same period in 2021.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It is predicted that with the increasing agility and “professionalism” of cyber criminals, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           the threat of both ransomware and cyber attacks on the supply chains will continue to grow
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The challenges for companies are enormous. It is extremely difficult to manage all hardware and software components from multiple providers, each potentially with its own requirements or security standards, and to adequately assess the resulting risk from, or through, the supply chain.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Insurance companies are also increasing their rates dramatically, higher premiums for both public and private organisations are a result of the rising demand for coverage in the light of 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           frequent and costly cyber crime incidents
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . According to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.marsh.com/fj/services/international-placement-services/insights/global_insurance_market_index.html" target="_blank"&gt;&#xD;
      
           Marsh’s
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            insurance pricing index, UK cyber insurance pricing increased by 66% in the third quarter of 2022, following a peak 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           increase of 102% year-over-year
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            in the first quarter of 2022.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Implementing appropriate organisational structures, policies, and processes to understand, assess, and systematically manage security risks to the network and information systems supporting essential functions is paramount
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At Methods we recognise that there is a fine balance between good security and business operation using a balance of business process, education, and technology to achieve a successful security outcome. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We take an outcome-led approach, supported by mature processes, professional staff, and accredited technology
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Organisations need protection from advanced cyber threat actors and we use the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/collection/caf" target="_blank"&gt;&#xD;
      
           NCSC Cyber Assessment Framework
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (CAF) to help support organisations undertake a systematic and comprehensive approach to assessing the extent to which cyber risks to essential functions are being managed by the organisation responsible.   
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           From advanced cyber threat actors, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           we can enable the secure exchange of sensitive information
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , between domains managing cyber security risks according to the UK National Cyber Security Centre guidance to help address the security concerns, whilst 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ensuring that the business objectives will still be met
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you would like to discuss this service then drop us an email at 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:cyber@methods.co.uk" target="_blank"&gt;&#xD;
      
           cyber@methods.co.uk
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , or you can visit 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cybermethods.co.uk/" target="_blank"&gt;&#xD;
      
           Cyber Methods
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            or our 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://methods.co.uk/what-we-do/cyber-security/" target="_blank"&gt;&#xD;
      
           Cyber Security
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            page to find more.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Screenshot+2023-09-11+at+19.16.55.png" length="1788162" type="image/png" />
      <pubDate>Mon, 11 Sep 2023 18:18:16 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/with-cyber-attacks-increasing-28-yoy-and-insurance-premiums-skyrocketing-organisations-must-reassess-their-supply-chains-to-meet-stricter-guidelines</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Screenshot+2023-09-11+at+19.16.55.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Screenshot+2023-09-11+at+19.16.55.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Methods is a member of the UK Cyber Security Council</title>
      <link>https://www.cybermethods.co.uk/methods-is-a-member-of-the-uk-cyber-security-council</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods is a member of the UK Cyber Security Council
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/UKCSC-Logo-High-Res-768x266.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods has been appointed as a member of the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ukcybersecuritycouncil.org.uk/" target="_blank"&gt;&#xD;
      
           UK Cyber Security Council
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Formed to be the voice for the UK cyber security profession, the Council has an increasing responsibility for cyber and national interests, and works to bring together key stakeholders to drive and build engagement in developing standards and ethical practice, identifying and acting on current issues, and promoting the profession.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In collaboration with multiple UK Government departments and the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/" target="_blank"&gt;&#xD;
      
           National Cyber Security Council
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (NCSC), the Council works to improve cyber security awareness and resilience for public good, and shape the standards that individual practitioners will be held to.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As a member of the Council, Methods has committed to support the raising of professional standards in the undertaking of cyber security, as well as committing to ensuring our staff abide by the Council’s 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ukcybersecuritycouncil.org.uk/professional-standards-and-ethics/guiding-principles-for-individuals/" target="_blank"&gt;&#xD;
      
           Code of Conduct
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ukcybersecuritycouncil.org.uk/professional-standards-and-ethics/code-of-ethics/" target="_blank"&gt;&#xD;
      
           Code of Ethics
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;blockquote&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We at Methods pride ourselves in delivering best practice, pragmatic Cyber Security solutions. The UK Cyber Security Council is a powerful platform for sharing our experience, and learning from other practitioners, to ultimately improve Cyber Security awareness and drive professional standards.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/blockquote&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Gareth Jones, Chief Information Security Officer, Methods
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Cyberimage.jpeg" length="182473" type="image/jpeg" />
      <pubDate>Mon, 11 Sep 2023 18:05:25 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/methods-is-a-member-of-the-uk-cyber-security-council</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Cyberimage.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Cyberimage.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>‘Securing an open and resilient digital future’ – Key takeout’s from CYBERUK23</title>
      <link>https://www.cybermethods.co.uk/securing-an-open-and-resilient-digital-future-key-takeouts-from-cyberuk23</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ‘Securing an open and resilient digital future’ – Key takeout’s from CYBERUK23
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Screenshot+2023-09-11+at+12.49.12.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/james-t-a0b13124/" target="_blank"&gt;&#xD;
      
           James Tee
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/william-keogh-b2801541/" target="_blank"&gt;&#xD;
      
           myself
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            recently attended 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cyberuk.uk/" target="_blank"&gt;&#xD;
      
           CYBERUK
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , held for the first time in the vibrant city of Belfast and coinciding with the historic 25th anniversary of the Good Friday Agreement.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CYBERUK is the UK’s flagship cyber security event
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            run by the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/section/keep-up-to-date/cyberuk" target="_blank"&gt;&#xD;
      
           National Cyber Security Centre
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (NCSC) and is a chance for cyber professionals to gain an insight to the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           challenges and future threats the UK face
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . With guests from across the globe, representing governments and industry leaders, speaking on securing an open and resilient digital future, it was an exciting few days.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The event, held at the International Conference Centre (ICC) Belfast, examined how today’s cyber ecosystem – 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           a sector worth £10 billion to the UK economy
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – is able to strengthen, join together, and innovate in order to resist the threats, be ready for opportunities, and keep the UK the safest place to live and work online.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The programme was packed with four main ‘Streams’ covering a broad range of technical and non-technical areas:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stream A – Strong ecosystem; resilient society
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stream B – Threats, risks, and vulnerabilities
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stream C – Securing foundations for technology advantage
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stream D – Interactive workshops
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The event kicked-off with an informal welcome drinks reception at St George’s market and was a chance to network with peers, meet sponsors, catch-up with friends, and hear from industry figures, all while enjoying drinks, local food, and entertainment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/CYBERUK23-Music.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The following day, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/lindy-c-40710429/" target="_blank"&gt;&#xD;
      
           Lindy Cameron
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , CEO of NCSC welcomed delegates, this was followed by a ministerial address from The 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/oliverdowden/" target="_blank"&gt;&#xD;
      
           Rt Hon Oliver Dowden CBE MP
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . The main takeaways were:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The growing threat China posed to the world economy 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           if we don’t keep pace with their technological developments, coupled with its ambition to become the world leader in technology. This has become more apparent considering the increased reliance western organisations place on China to provide for the global supply chain.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            The 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           skills shortage within the industry
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            still remains an on-going issue within the UK where roughly 13,000 people are needed to plug the gap within the workforce and maintain a robust cyber resilience for the UK economy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            GovAssure officially launched and will require 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           government entities to undergo an assessment of their cyber security set-up against one of two NCSC Cyber Assessment Frameworks
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (CAF). The aim for this is to ensure that each government entity has a risk profile and is able to better understand the level of cyber resilience across government so that any vulnerabilities can be addressed before they are exploited.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Advances in quantum computing and artificial intelligence
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (AI) proved to be popular topics of conversation with panel discussions highlighting the growing need to exploit the opportunities that could be gained from adopting these sooner rather than later, but airing caution over the potential new threats they may pose to organisations and the speed at which cyber criminals are able to exploit new technologies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            AI remains to be one of the most exciting technologies to be used within the cyber industry, however, organisations are still slow to adopt new technologies. There is increasing 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           concern regarding the amount of technical debt within UK organisations
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            that neglect updating their IT systems and do not have the foundations of cyber resilience in place.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            The need to collaborate with partners, vendors, and governments. The 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           sharing of intelligence and providing an increased transparency of technologies and standards
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            significantly helps those smaller states that don’t have the resources available to develop their own technologies. They rely on the likes of the US and UK to lead the developments in cyber standards and practices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One key statistic that stood out for me was that 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           only 13% of primes assess the risks associated with their suppliers
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . From this there was a call for introducing joint top table exercises so supply chains can become more resilient when things go wrong and partners can work together to overcome the threats and vulnerabilities quickly to minimise damages.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you’d like to learn more about how the Methods Cyber and Technical Advisory team can help your organisation to adapt and comply with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/organisation/methods/cyber-security-consultancy" target="_blank"&gt;&#xD;
      
           Gov Assure
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , or to become a more resilient organisation, please take a look at what we have to offer on 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cybermethods.co.uk/" target="_blank"&gt;&#xD;
      
           Cyber Methods
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and get in touch!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/IMG_0072-min-1024x768.jpg" length="86742" type="image/jpeg" />
      <pubDate>Mon, 11 Sep 2023 11:53:46 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/securing-an-open-and-resilient-digital-future-key-takeouts-from-cyberuk23</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/IMG_0072-min-1024x768.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Junaid Mohammad achieves Certified Cyber Professional (CCP) accreditation from the NCSC Assured Cyber Consultancy</title>
      <link>https://www.cybermethods.co.uk/junaid-mohammad-achieves-certified-cyber-professional-ccp-accreditation-from-the-ncsc-assured-cyber-consultancy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Junaid Mohammad achieves CCP accreditation from the NCSC Assured Cyber Consultancy
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are delighted to announce that 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Junaid Mohammad has achieved a NCSC (Security Architecture) Certified Cyber Professional (CCP) accreditation from the Assured Cyber Consultancy. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This builds on Methods’ Cyber &amp;amp; Technical Advisory Team’s 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://methods.co.uk/news/methods-is-a-member-of-the-uk-cyber-security-council/" target="_blank"&gt;&#xD;
      
           NCSC Cyber Assured Service Provider
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            status (which is 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           held by less than 25 companies in the UK)
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , that was acquired and maintained by Methods since 2021.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NCSC CCP has taken a lot of hard work and dedication and is awarded only to those who demonstrate sustained ability to apply their skills, knowledge, and expertise in real-world situations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Cyber &amp;amp; Technical Advisory Team, are able to demonstrate and provide the following service to our clients:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            we provide trust and credibility by demonstrably maintaining high levels of expertise, and adherence to industry best practices
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            we provide confidence that our certified individuals possess the necessary knowledge, skills, and experience to effectively contribute to cyber security efforts
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            we are recognised within the UK cyber security industry, achieving the most credible certification
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            we provide assurance to clients through our NCSC CCP-certified professionals, bringing a recognised level of expertise to their projects
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            we help improve the security posture of organisations and strengthen their cyber security defenses
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            we stay updated with the latest trends, technologies, and threats in the field of cyber security, in order to maintain and develop the skills through continuing professional development (CPD) activities.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As a dedicated NCSC Cyber Assured Service Provider, Methods’ Cyber &amp;amp; Technical Advisory Team is committed to upskilling and expanding the cyber security workforce. We are actively collaborating with the UK Cyber Security Council (UKCSC) during the transition of stewardship, aiming to establish a new professional standard for cyber security and define long-term goals for specialised roles within the field. You can find more information 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ukcybersecuritycouncil.org.uk/professional-standards/" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is National Cyber Security Centre (NCSC)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/" target="_blank"&gt;&#xD;
      
           NCSC
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            supports the most critical organisations in the UK, the wider public sector, industry, SMEs, as well as the general public. When incidents do occur, they provide effective incident response to minimise harm to the UK, help with recovery, and learn lessons for the future. The NCSC provides a single point of contact for SMEs, larger organisations, government agencies and departments, and the general public. They also work collaboratively with law enforcement, defence, the UK’s intelligence and security agencies, and international partners.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is National Cyber Security Centre’s Certified Cyber Professional
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           National Cyber Security Centre’s Certified Cyber Professional (
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/blog-post/putting-the-consultancy-community-at-its-heart" target="_blank"&gt;&#xD;
      
           NCSC CCP
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ) program is developed by the UK’s National Cyber Security Centre (NCSC), to establish a recognised standard for cyber security professionals and to enhance the quality and professionalism of cyber security practice in the UK.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Certified Professional assured service is a recognition of competence which is awarded to those who demonstrate their sustained ability to apply their skills, knowledge, and expertise in real-world situations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Junaid Mohammad new Head of Security Architecture
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Junaid’s dedication and diligence throughout his four-year tenure at Methods has seen him consistently deliver an exceptional and competent service, whilst contributing significantly to the advancement of the profession. As a result of his remarkable efforts, Junaid has earned a well-deserved promotion to the position of Head of Security Architecture.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We extend our heartfelt congratulations to Junaid on achieving the highly sought-after recognition of NCSC CCP, and earning the well-deserved promotion. This promotion is a clear testament to his expertise and proficiency in the field of cyber security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Keep up the excellent work, Junaid! You are an invaluable asset to Methods.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Picture+Methods+gradient-5f11983b.png" length="607280" type="image/png" />
      <pubDate>Mon, 11 Sep 2023 10:48:57 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/junaid-mohammad-achieves-certified-cyber-professional-ccp-accreditation-from-the-ncsc-assured-cyber-consultancy</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Picture+Methods+gradient-5f11983b.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Picture+Methods+gradient-5f11983b.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Improving agility and reducing cyber security risk by migrating to the cloud, at Abertay University</title>
      <link>https://www.cybermethods.co.uk/improving-agility-and-reducing-cyber-security-risk-by-migrating-to-the-cloud-at-abertay-university</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Improving agility and reducing cyber security risk by migrating to the cloud, at Abertay University
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://coreazure.com/" target="_blank"&gt;&#xD;
      
           CoreAzure
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            has delivered an exciting cloud migration programme at Abertay University, that will see the majority of IT services transition to the Microsoft cloud platform – Azure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The programme builds upon their existing use of cloud capabilities including Azure Lab Services, which are now being used to support the delivery of teaching and learning in areas such as cyber security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The successful transition to cloud business case focused on modernising their IT infrastructure by improving resilience, scalability, security posture, and taking advantage of innovative digital technologies in the future.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Quote from Frazer Greig, Head of IT and Corporate Services at Abertay University:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “From the outset CoreAzure used their considerable experience of successfully transitioning universities to the cloud to demonstrate how the use of the Microsoft cloud platform could positively impact our IT services. Improving agility, reducing cyber security risk and our carbon footprint by decreasing our campus data centre capacity significantly are key objectives of the programme. At the end of the project, we will have a modern, secure IT infrastructure capable of delivering a wide range of innovative digital services to our students and staff.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_1110549236.jpg" length="204883" type="image/jpeg" />
      <pubDate>Mon, 09 May 2022 13:19:12 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/improving-agility-and-reducing-cyber-security-risk-by-migrating-to-the-cloud-at-abertay-university</guid>
      <g-custom:tags type="string">cyber,security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_1110549236.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_1110549236.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Redefining the security perimeter around the identity of a ‘person’ or ‘thing’</title>
      <link>https://www.cybermethods.co.uk/redefining-the-security-perimeter-around-the-identity-of-a-person-or-thing</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Redefining the security perimeter around the identity of a ‘person’ or ‘thing’
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            With the transition to work anywhere, applications moving to the cloud, and the increased use of technologies and data mobility reaching more devices,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           traditional security platforms no longer provide the levels of security and access control modern digital organisations need
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Most corporate assets are now outside the traditional security perimeters, rending legacy controls inadequate, to protect them against increased cyber threats. With remote working and work-from-anywhere the new norm, enterprises have transformed into a geographically distributed environment of assets, employees, partners, and customers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            So, with more assets now existing outside of the traditional security perimeter,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           cybersecurity needs to be redefined
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , around the identity of a person or thing. As perimeter protection becomes less meaningful, the security approach of a walled city must evolve.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So – where do we go?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.gartner.com/smarterwithgartner/gartner-top-security-and-risk-trends-for-2021" target="_blank"&gt;&#xD;
      
           Gartner’s Top Security and Risk Trends for 2021
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            report identified cybersecurity mesh as the “modern conceptual approach to security architecture, that enables the distributed enterprise to deploy and extend security where it’s most needed.” – but what does that mean?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           My personal view is that cybersecurity mesh is yet another building block (foundation) of a Zero Trust journey ensuring all data, services, devices, and applications are accessed securely regardless of where they are. All connections to access the data are considered unreliable unless verified.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A cybersecurity mesh enables scalable, flexible, and reliable cybersecurity controls via a distributed architectural approach. With more assets existing outside of the traditional security perimeter, cybersecurity mesh allows for the security perimeter to be defined around the identity of a person or thing. This approach to network security leads to a more standardised, responsive security approach, that prevents hackers from exploiting different parts of a given network, in order to access the broader network.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whether you want to call it a cyber security mesh or zero trust model, when you are up against a skilled, professional adversary (e.g. Advanced Persistent Threat (APT29) which is a threat group that has been attributed to Russia’s Foreign Intelligence Service (SVR)), this model helps move organisations to a proactive security posture to defend and investigate against such attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you’d like to find out more, please visit 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://methods.co.uk/what-we-do/cyber-security/" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_1538502431.jpg" length="266401" type="image/jpeg" />
      <pubDate>Wed, 09 Mar 2022 12:43:30 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/redefining-the-security-perimeter-around-the-identity-of-a-person-or-thing</guid>
      <g-custom:tags type="string">cyber,security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_1538502431.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_1538502431.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>CISO Gareth Jones achieves lead practitioner certification from the BCS CCP</title>
      <link>https://www.cybermethods.co.uk/ciso-gareth-jones-achieves-lead-practitioner-certification-from-the-bcs-ccp</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CISO Gareth Jones achieves lead practitioner certification from the BCS CCP
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/BCS-LOGO-UK.-1024x742-8b690713.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are delighted to announce that Methods CISO 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/gareth-jones-83967151/" target="_blank"&gt;&#xD;
      
           Gareth Jones
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , has been awarded the highest certification for Cyber Security / IA Architect by the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.bcs.org/qualifications-and-certifications/certifications-for-professionals/information-security-and-ccp-assured-service-certifications/ncsc-certified-cyber-professional-ccp-assured-service/" target="_blank"&gt;&#xD;
      
           BCS CCP Scheme
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/" target="_blank"&gt;&#xD;
      
           National Cyber Security Centre
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (NCSC) recognition sets the professional standards for cyber practitioners in the UK, supporting the development of a robust and respected cyber security profession. The CCP has been developed by the NCSC in consultation with the government, industry and academia’s to address the growing need for specialists in the cyber profession.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As part of Methods’ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://methods.co.uk/news/methods-awarded-certified-cyber-security-consulting-accreditation-by-the-national-cyber-security-centre-ncsc/" target="_blank"&gt;&#xD;
      
           ongoing commitment to the NCSC Certified Cyber Security Consultancy
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , we strive to deliver independently certified people to deliver work and consultancy for government, wider public sector, and Critical National Infrastructure organisations. As such, Methods’ Cyber and Information team work to honour this commitment through upskilling their technical abilities in this specialism, completing appropriate professional development frameworks, and knowledge transfer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The CCP specialism recognition is valid for three years, and will be re-evaluated throughout this period to ensure that professionals are maintaining a level of skills and knowledge.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Well done Gareth – this certification is a credit to your passion, diligence, enthusiasm, and knowledge in this field.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/scott-graham-5fNmWej4tAA-unsplash.jpg" length="197239" type="image/jpeg" />
      <pubDate>Thu, 03 Mar 2022 15:11:21 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/ciso-gareth-jones-achieves-lead-practitioner-certification-from-the-bcs-ccp</guid>
      <g-custom:tags type="string">news,cyber,Accreditations</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/scott-graham-5fNmWej4tAA-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/scott-graham-5fNmWej4tAA-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tackling a sophisticated HTML smuggling campaign against a global UK public sector organisation</title>
      <link>https://www.cybermethods.co.uk/ackling-a-sophisticated-html-smuggling-campaign-against-a-global-uk-public-sector-organisation</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tackling a sophisticated HTML smuggling campaign against a global UK public sector organisation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Defending against HTML smuggling
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Methods’ Group security and risk consultants from CoreAzure and Methods BDT have been engaged with a major global UK public sector organisation to provide security operation center (SOC) services, and have recently been
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           defending against a sophisticated HTML smuggling campaign
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . The SOC team investigated this as part of a wider phishing campaign in which targeted users were sent malicious files
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           imitating a legitimate business process
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            in an effort to gain access to the organisation’s environment.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A total of 77 HTML smuggling emails were detected
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , of which
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           17 users reported these as suspicious.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Of the 77 malicious emails detected,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           the SOC team only received 15 high severity
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            from Azure Sentinel.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Further research found the method used by the threat actor(s) was HTML smuggling. The
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           HTML smuggling method is highly evasive
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            as it can bypass standard perimeter security controls such as web proxies and email gateways, which only check for suspicious attachments like EXE, ZIP, or DOCX.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Below is a graph showing the trend of emails delivered which were recognised as phishing emails.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/HTML-code-phishing-graph-002.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Figure 1 depicts ‘recipients’ on left hand axis against the ‘chart time zone (UTC)’
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The main purpose of this style of attack is to
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            install malware code
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , Trojans, spyware etc. to gain access to an organisation’s environment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            HTML smuggling is a malicious technique used by threat actors to
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           hide malware in an encoded script in a specially crafted HTML attachment or web page
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . The malicious script decodes and deploys the payload on the targeted device when the victim opens the HTML attachment. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections and generate malicious files behind the organisation’s firewall. Microsoft researchers stated this technique was observed in a spear-phishing campaign by the infamous NOBELIUM.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Microsoft-Smuggling-Surge-Graph.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Figure 2. HTML Smuggling Overview – Microsoft 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Specifically,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           HTML smuggling leverages the HTML5 “download” attribute for anchor tags
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , as well as the creation and use of a JavaScript Blob to put together the payload downloaded into an affected device.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            HTML smuggling presents challenges to traditional security solutions. Effectively defending against this stealthy technique requires defence in depth. It is always better to
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           thwart an attack early in the attack chain
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           —at the email gateway and web filtering level. If the threat manages to fall through the cracks of perimeter security and is delivered to a host machine, then endpoint protection controls should be able to prevent execution.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It may not be straight forward to defend against this method of attack due to the wide use of JavaScript
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and the way it is utilised throughout an organisation’s environment. It is almost impossible to identify malicious JavaScript as it flows down the wire as the same JavaScript code which can be obfuscated in many different ways, and therefore content or signature matching will be challenging to do. In addition, many legitimate JavaScript frameworks make use of obfuscation techniques in order to minimise file sizes and improve the speed of web applications, so simply blocking obfuscated JavaScript is not really an option either.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft 365 Defender Threat Intelligence Team recommend that Endpoint security teams should be looking for:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            JavaScript or VBScript from automatically running a downloaded executable file
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            running potentially obfuscated scripts
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            executable files from running “unless they meet a prevalence, age, or trusted list criterion”.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The SOC team suggested the following remediation steps to the organisation impacted (provided by Microsoft) to mitigate the risk of HTML smuggling:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you would like to talk to our security experts or find out more how Methods could help you, please contact
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:cyber@methods.co.uk" target="_blank"&gt;&#xD;
      
           cyber@methods.co.uk
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Computer+code+and+glasses.jpg" length="197033" type="image/jpeg" />
      <pubDate>Thu, 03 Mar 2022 12:43:31 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/ackling-a-sophisticated-html-smuggling-campaign-against-a-global-uk-public-sector-organisation</guid>
      <g-custom:tags type="string">cyber,security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Computer+code+and+glasses.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Computer+code+and+glasses.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber signals: defending against cyber threats with the latest research, insights, and trends</title>
      <link>https://www.cybermethods.co.uk/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber signals: defending against cyber threats with the latest research, insights, and trends
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            At the start of the month Microsoft introduced
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.microsoft.com/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/" target="_blank"&gt;&#xD;
      
           Cyber Signals
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, to be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world’s most prolific threat actors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As we have seen ourselves working with customers, cyber attacks by nation-state actors are on the rise and despite their vast resources, these adversaries often rely on simple tactics to steal passwords, not protected by MFA etc.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The recommendations made by Microsoft reinforce how effective the following controls can be:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enable multi-factor authentication – to verify the authenticity of users and activities: 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           By doing so, organisations mitigate the risk of passwords falling into the wrong hands . Even better, eliminate passwords altogether by using passwordless MFA.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Audit account privileges:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Privileged-access accounts, if hijacked, become a powerful weapon attackers can use to gain greater access to networks and resources. Security teams should audit access privileges frequently, using the principle of least-privilege granted to enable employees to get jobs done.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review, harden, and monitor all tenant administrator accounts:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Security teams should thoroughly review all tenant administrator users or accounts tied to delegated administrative privileges to verify the authenticity of users and activities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Establish and enforce a security baseline to reduce Audit account privileges:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Nation-states play the long game and have the funding, will, and scale to develop new attack strategies and techniques. Every network-hardening initiative delayed due to bandwidth or bureaucracy works in their favour. Security teams should prioritise implementing zero-trust practices like MFA and passwordless upgrades.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You’ll find this 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.microsoft.com/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/" target="_blank"&gt;&#xD;
      
           article
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            a worthy a read on the topic.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Are you looking to get a Threat Modelling Platform in place to prevent attacks from damaging your business?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you would like to find out how Methods can help your organisation to implement Threat Modelling to protect your business, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://pages.methods.co.uk/WC-Threat-Modelling-Consultation_LP-WC-Threat-Modelling-Consultation-Request.html" target="_blank"&gt;&#xD;
      
           register for a consultation.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://pages.methods.co.uk/WC-Threat-Modelling-Consultation_LP-WC-Threat-Modelling-Consultation-Request.html" target="_blank"&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To protect against these risks, we:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            deliver embedded threat modelling to improve the security of your organisation
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            assist in building your threat modelling capabilities
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            provide tools, training and ongoing access to key threat intelligence.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Picture+Methods+gradient+flip.png" length="621185" type="image/png" />
      <pubDate>Thu, 17 Feb 2022 12:43:30 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends</guid>
      <g-custom:tags type="string">cyber,security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Picture+Methods+gradient+flip.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Picture+Methods+gradient+flip.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Framework: Cyber Security Services 3</title>
      <link>https://www.cybermethods.co.uk/framework-cyber-security-services-3</link>
      <description>This Dynamic Purchasing System offers an extensive variety of cyber security services from a range of pre-qualified suppliers. It is open to all UK public sector bodies for support in areas such as Consultancy and Advice, Penetration Testing and IT Health Check, Incident Management, Data Destruction, and Sanitation Services.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Framework: Cyber Security Services 3
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Description
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This Dynamic Purchasing System offers an extensive variety of cyber security services from a range of pre-qualified suppliers. It is open to all UK public sector bodies for support in areas such as Consultancy and Advice, Penetration Testing and IT Health Check, Incident Management, Data Destruction, and Sanitation Services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods can offer the following services on this DPS:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Consultancy and Advice
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Including: Risk Management and Assessment, Security Architecture, Training and Policy Development.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Incident Management
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Including: Cyber Incident Response, Disaster Recovery, Threat Intelligence, Business Continuity and Disaster Recovery.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Benefits
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Consultancy and Advice
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Including: Risk Management and Assessment, Security Architecture, Training and Policy Development.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Incident Management
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Including: Cyber Incident Response, Disaster Recovery, Threat Intelligence, Business Continuity and Disaster Recovery.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How can you buy our services?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Suppliers can be selected via further competition. Please refer to the buyer’s guidance 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.crowncommercial.gov.uk/agreements/RM3764.3" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Further information
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To find out more information about Cyber Security services offered by Methods, please see 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://methods.co.uk/what-we-do/cyber-security/" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you would like more information on how to procure through any of Method’s frameworks, please contact 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:bidteam@methods.co.uk" target="_blank"&gt;&#xD;
      
           bidteam@methods.co.uk
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_661113826.jpg" length="278544" type="image/jpeg" />
      <pubDate>Mon, 14 Feb 2022 15:40:46 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/framework-cyber-security-services-3</guid>
      <g-custom:tags type="string">news,cyber,security,framework</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_661113826.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/shutterstock_661113826.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>2021 trends show increased globalised threat of ransomware</title>
      <link>https://www.cybermethods.co.uk/2021-trends-show-increased-globalised-threat-of-ransomware</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2021 trends show increased globalised threat of ransomware
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cisa.gov/uscert" target="_blank"&gt;&#xD;
      
           Cybersecurity and Infrastructure Security Agency
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (CISA), the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.fbi.gov/" target="_blank"&gt;&#xD;
      
           Federal Bureau of Investigation
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (FBI), the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nsa.gov/" target="_blank"&gt;&#xD;
      
           National Security Agency
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (NSA), the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cyber.gov.au/" target="_blank"&gt;&#xD;
      
           Australian Cyber Security Centre
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (ACSC), and the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ncsc.gov.uk/" target="_blank"&gt;&#xD;
      
           National Cyber Security Centre
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (NCSC-UK) have released a joint 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-040a" target="_blank"&gt;&#xD;
      
           Cybersecurity Advisory
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (CSA) highlighting a global increase in sophisticated, high-impact, ransomware incidents against critical infrastructure organisations in 2021.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This CSA provides observed behaviors and trends as well as mitigation recommendations to help network defenders reduce their risk of compromise by ransomware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CISA encourages users and administrators to review joint 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-040a" target="_blank"&gt;&#xD;
      
           CSA: 2021 Trends Show Increased Globalized Threat of Ransomware
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and visit 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cisa.gov/stopransomware" target="_blank"&gt;&#xD;
      
           StopRansomware.gov
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            for more information on protecting against and responding to ransomware attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/hannah-wei-aso6SYJZGps-unsplash.jpg" length="117766" type="image/jpeg" />
      <pubDate>Thu, 10 Feb 2022 14:27:38 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/2021-trends-show-increased-globalised-threat-of-ransomware</guid>
      <g-custom:tags type="string">news,security,cyber</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/hannah-wei-aso6SYJZGps-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/hannah-wei-aso6SYJZGps-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Press Release : Methods and IriusRisk partner to deliver automated threat modelling for public sector software</title>
      <link>https://www.cybermethods.co.uk/press-release-methods-and-iriusrisk-partner-to-deliver-automated-threat-modelling-for-public-sector-software</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Press Release : Methods and IriusRisk partner to deliver automated threat modelling for public sector software
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Methods+-+Iriusrisk.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our partnership will drive hybrid cloud transformation in software by enabling security as a continuous service.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           19th January 2022
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : Automated threat modelling company 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.iriusrisk.com/" target="_blank"&gt;&#xD;
      
           IriusRisk
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            has partnered with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://methods.co.uk/" target="_blank"&gt;&#xD;
      
           Methods
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , the leading public sector digital transformation consultant to deliver embedded threat modelling to improve the security of public sector services. The partnership has already seen two out of the five top public sector bodies incorporating IriusRisk threat modelling capabilities into their service offerings.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The partnership allows Methods to offer threat modelling and DevOps for UK government and public sector applications. Continuous threat modelling of applications and Cloud Services means that security is upheld as a continuous service, vastly reducing the risk of software vulnerabilities that could be exploited. This includes architectural design, analysis and threat modelling consulting service capabilities based around the IriusRisk Threat Modelling Platform. With IriusRisk, public sector organisations are also able to investigate and quantify inherent legacy risks in existing software through automated threat modelling, driving and informing remedial security programs to update key public sector services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods will also use IriusRisk as a basis for education and awareness programmes on cyber security threats, assisting public sector organisations in building their own threat modelling capabilities – including tools, training and ongoing access to key threat intelligence.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Methods will be making their threat modelling ‘portfolio’ available via the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.crowncommercial.gov.uk/agreements/RM6100" target="_blank"&gt;&#xD;
      
           Crown Commercial Service – Tech Services 3 framework
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – enabling UK public sector organisations to procure through the approved government frameworks – thereby qualifying IriusRisk as a UK Government approved supplier.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Gareth Jones, Chief Information Security Officer at Methods said:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “Threat modelling has become an increasingly important part of our S-SDLC process as it is recognised as one of the most effective approaches to reduce cyberattacks and costly redevelopment. Our approach is tailored to each customer, supported by national and international standards that address systemic risks. The evolution of threat modelling has moved from being a manual time-consuming process to adopting automated tools which speeds up secure application development and release software faster.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Using IriusRisk helps enable the implementation of security into software design, without requiring DevOps engineers to completely re-train as security professionals. In practice, threat modelling has the potential to change the relationship between developers and security professionals and create the ultimate goal of DevSecOps, a truly cross-functional team.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Commenting on the partnership CEO and co-founder of IriusRisk Stephen De Vries said:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “We are delighted to be partnering with Methods, who are a leader in public sector digital transformation. The public sector is acutely vulnerable to security risks and this partnership with Methods will mean that these organisations are able to feel confident not only in the security of their software products from the offset, but throughout their life cycles. We are excited to see our threat modelling services rolled out throughout the public sector, allowing threat modelling to become embedded in software design from the earliest stages”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About Methods
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Since our establishment in 1990, Methods has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. We are passionate about the work we do and transforming services for citizens. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About IriusRisk
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IriusRisk is the industry’s leading threat modelling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start – using its powerful threat modelling platform.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whether teams are implementing threat modelling from scratch, or scaling-up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Background+image-30a39fa7.png" length="2022758" type="image/png" />
      <pubDate>Wed, 19 Jan 2022 14:43:14 GMT</pubDate>
      <guid>https://www.cybermethods.co.uk/press-release-methods-and-iriusrisk-partner-to-deliver-automated-threat-modelling-for-public-sector-software</guid>
      <g-custom:tags type="string">news,security,cyber,threat modeling</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Background+image-30a39fa7.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/34ce9c05/dms3rep/multi/Background+image-30a39fa7.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
