Time to Sign Up for Content Threat Removal

A spear-phishing campaign targeting Docusign customers underlines the importance of identifying high value assets within the organisation and ensuring they are properly protected with Content Threat Removal. According to Cyber security research firm CyberSecurity...

WannaCry and the NHS Windows XP Estate

As the post-mortem on WannaCry continues, we look at practical solutions for cash strapped healthcare providers tasked with defending their Windows XP estate. Nearly 3 weeks before WannaCry was released, Deep Secure warned that the NHS was particularly vulnerable to...

AV False Positives Highlight Drawbacks of Threat Detection

News from Webroot that their anti-virus update mistook Windows Systems files for Malware and Facebook for a phishing site highlights what a flawed paradigm threat detection is. Threat detection is hard. Anyone doubting that should spare a thought for Webroot and their...

Combatting the Cyber Threat to the NHS

As a new report from NHS Digital highlights the extent to which systems are under attack from cyber criminals, we look at the practical steps that can be taken to combat the threat. In October 2016, the North Lincolnshire and Goole NHS Trust was forced to pull the...

Cyber Security in the Age of Complexity

A survey published by the British Chamber of Commerce (BCC) suggests that as many as one in five firms were attacked by hackers last year. There are a host of factors that contribute to this depressing statistic, but one of the most important underlying issues is...

Deep Secure welcomes West Worcestershire MP

Harriett Baldwin, Member of Parliament for West Worcestershire visited our HQ last week. The visit coincides with the business preparing to launch its latest innovation in the fight against cyber threats at June’s Infosecurity Europe show at Olympia, London. The Deep...

The Antidote to Serpent Ransomware

Serpent ransomware is well made, geographically focussed and utilises some highly effective technical and social engineering techniques to target unwary users.  With so many conventional cyber security defences failing to successfully combat this type of malware, we...