Cyber Security in 2026: What Can You Expect?

Cyber security has always been a fast-moving space and that become even more evident as we approach 2026. We’re not just facing new threats, we’re seeing a complete shift in how risks are created, understood, and resolved. AI is no longer a future conversation. It’s already changing how attackers behave and how defenders must respond. […]

Cyber Security in Focus: Lessons from Secon’s 2025 Webinar Series

In 2025, the conversation around cyber security shifted. Organisations stopped asking, “What tool do I need?” and started asking, “Are we ready to respond when it counts?” That’s what our Cyber Security in Focus series set out to address. Across 15 expert-led webinars, we explored what’s really working in cybersecurity today, and what isn’t. We tackled the […]

The Microeconomic Effects of Cyber Security Breaches on SME Production Capacity

Cyber security isn’t a luxury, it’s a core part of business resilience. And 2025 has made that clearer than ever. Consider the late‑summer 2025 cyber‑attack on Jaguar Land Rover. The disruption forced a complete halt to production of approximately 1,000 vehicles per day across its UK sites and triggered a ripple effect across around 5,000 supply‑chain firms. The […]

Healthcare Cyber Security: Protecting Patients, Systems, and Trust

The UK’s healthcare system is navigating a perfect storm. Chronic staffing shortages, increasing patient demand, and the rapid shift towards digital health records and connected care are all reshaping how services are delivered. From AI-assisted diagnostics to remote consultations and electronic prescribing, technology is now at the heart of the patient journey. While these innovations […]

The Threat Within: What are Insider Threats in Cyber Security?

Cyber security discussions often revolve around external attackers. Malware. Phishing. Ransomware gangs. But there is another threat that isn’t trying to break in, it’s already inside. Insider threats in cyber security are complex, human in nature, and often hard to detect using traditional security tools. Insider threats are posed by people with legitimate access to […]

What You Can’t See Can Hurt You: Tackling Shadow IT and File Sharing Risks

Every day, your people are doing what they do best, collaborating, sharing, and getting things done. But the tools that make work flow smoothly can also create risks you can’t always see. That’s the reality of Shadow IT: apps and services your teams use without formal approval, operating just under the surface. In our latest […]

Cyber Security for Hybrid Work: Rethinking Protection

As hybrid work becomes a long-term norm rather than a temporary adjustment, organisations face a critical challenge: how to secure a workforce that operates across multiple locations, devices, and networks, without disrupting performance or productivity. This new reality has exposed the limitations of traditional security models. Legacy architectures rely on a clearly defined perimeter and […]

Cyber Attack on Law Firms in the UK

UK Law firms are no strangers to the threat of cyber-attacks. Cyber-attacks on law firms in the UK have surged by 77% in the past year, rising from 538 incidents in 2022/23 to 954 in 2023/24 according to Crowe. As the legal sector undergoes rapid digital transformation, cybercriminals are exploiting gaps in cyber security to […]

From Exposed to Empowered: Fixing Fatal Flaws in Vulnerability Management

Vulnerability management has long been a staple of modern cyber security strategies. But as HD Moore, founder of the Metasploit Project and CEO of runZero, made clear in our recent Secon Cyber webinar, the industry’s traditional approach is no longer fit for purpose. Watch the webinar recording below: In an era where attackers move faster […]