Firewall Misconfiguration: The Quiet Way Organisations Lose Control of Their Network

Firewall misconfiguration creates silent risk. Learn common causes, examples, and best-practice fixes to regain control.
Leadership Announcement as Secon Cyber Enters a New Chapter

Secon Cyber is pleased to share an important leadership update that marks the next chapter in our journey, while reinforcing the continuity, values, and partnership our clients know and trust. After more than 26 years as CEO, Rob Gupta is moving into the role of Executive Chairman. As part of this transition, Linton Geach has been […]
Cyber Security in 2026: What Can You Expect?

Cyber security has always been a fast-moving space and that become even more evident as we approach 2026. We’re not just facing new threats, we’re seeing a complete shift in how risks are created, understood, and resolved. AI is no longer a future conversation. It’s already changing how attackers behave and how defenders must respond. […]
Cyber Security in Focus: Lessons from Secon’s 2025 Webinar Series

In 2025, the conversation around cyber security shifted. Organisations stopped asking, “What tool do I need?” and started asking, “Are we ready to respond when it counts?” That’s what our Cyber Security in Focus series set out to address. Across 15 expert-led webinars, we explored what’s really working in cybersecurity today, and what isn’t. We tackled the […]
Ransomware 2025: Get Ready or Get Wrecked Webinar

What would happen if ransomware hit your business tomorrow? Would you spot it in time?Would your defences hold up?Would you even know you’ve been breached? In our latest webinar, we were joined by Glenn Wilkinson, ethical hacker and CEO of Agger Labs, for a live session that breaks down exactly how ransomware works in 2025 […]
The Microeconomic Effects of Cyber Security Breaches on SME Production Capacity

Cyber security isn’t a luxury, it’s a core part of business resilience. And 2025 has made that clearer than ever. Consider the late‑summer 2025 cyber‑attack on Jaguar Land Rover. The disruption forced a complete halt to production of approximately 1,000 vehicles per day across its UK sites and triggered a ripple effect across around 5,000 supply‑chain firms. The […]
ZTNA Unfiltered: What’s Working and What’s Just Hype.

From buzzwords to practical action, this live panel cut through the noise on Zero Trust, SASE, and ZTNA. Hosted by Secon’s Technical Director Linton Geach, the session brought together: These hands-on specialists didn’t just talk theory. They’ve deployed, broken, fixed, and optimised secure access strategies across real-world environments. What followed was an honest, insight-rich discussion […]
Cyber Security Best Practices in the Philippines: Understanding and Applying the 5 Pillars

In the Philippines, the stakes for data protection have never been higher. Every day, organisations face mounting pressure, not only from cybercriminals but from clients, regulators, and the public, to take privacy and security seriously. If you’re responsible for data in a business, government agency, or educational institution, the question isn’t if you’ll face a […]
Secon’s Latest Whitepaper: How AI Is Changing Cyber Security

There’s no shortage of conversation around AI right now, especially in cyber security. But when you look beyond the headlines, it becomes clear that many organisations are still figuring out what AI really means for their teams, their tools, and their risk. That’s why we’ve written this whitepaper. How AI is Changing Cyber Security: Insights […]