Ransomware 2025: Get Ready or Get Wrecked Webinar

What would happen if ransomware hit your business tomorrow? Would you spot it in time?Would your defences hold up?Would you even know you’ve been breached? In our latest webinar, we were joined by Glenn Wilkinson, ethical hacker and CEO of Agger Labs, for a live session that breaks down exactly how ransomware works in 2025 […]
The Microeconomic Effects of Cyber Security Breaches on SME Production Capacity

Cyber security isn’t a luxury, it’s a core part of business resilience. And 2025 has made that clearer than ever. Consider the late‑summer 2025 cyber‑attack on Jaguar Land Rover. The disruption forced a complete halt to production of approximately 1,000 vehicles per day across its UK sites and triggered a ripple effect across around 5,000 supply‑chain firms. The […]
Cyber Security Best Practices in the Philippines: Understanding and Applying the 5 Pillars

In the Philippines, the stakes for data protection have never been higher. Every day, organisations face mounting pressure, not only from cybercriminals but from clients, regulators, and the public, to take privacy and security seriously. If you’re responsible for data in a business, government agency, or educational institution, the question isn’t if you’ll face a […]
Identify. Isolate. Recover: Ransomware Response in the Age of AI

Ransomware is no longer just about encrypted files and ransom notes. It has evolved into a highly organised, multi-stage business model where attackers quietly infiltrate systems, target backups, and exfiltrate sensitive data before triggering a full-scale encryption event. In our latest Cyber Security in Focus webinar, Identify. Isolate. Recover: Ransomware Response in the Age of […]
Inside The Mind of A Hacker with RedFlags and Glenn Wilkinson

Our latest cyber security webinar was not your typical cyber security talk. In this session, hosted by Secon and sponsored by RedFlags, ethical hacker Glenn Wilkinson walked us through a real cyber-attack, step by step. You’ll see how fast an attacker can gain access to sensitive data, and more importantly, how timely, in-the-moment nudges can […]
Healthcare Cyber Security: Protecting Patients, Systems, and Trust

The UK’s healthcare system is navigating a perfect storm. Chronic staffing shortages, increasing patient demand, and the rapid shift towards digital health records and connected care are all reshaping how services are delivered. From AI-assisted diagnostics to remote consultations and electronic prescribing, technology is now at the heart of the patient journey. While these innovations […]
The Threat Within: What are Insider Threats in Cyber Security?

Cyber security discussions often revolve around external attackers. Malware. Phishing. Ransomware gangs. But there is another threat that isn’t trying to break in, it’s already inside. Insider threats in cyber security are complex, human in nature, and often hard to detect using traditional security tools. Insider threats are posed by people with legitimate access to […]
Generative AI in Wealth Management: Why Cyber Security Can’t Be an Afterthought

The conversation around generative AI in wealth management has shifted dramatically. No longer a novelty, it’s now a core enabler across portfolio design, client engagement, compliance operations, and trading strategies. From GenAI chatbots that speak your client’s language, to AI copilots that distil research and flag risks in real time, firms are embedding AI into […]
Cyber Security for Hybrid Work: Rethinking Protection

As hybrid work becomes a long-term norm rather than a temporary adjustment, organisations face a critical challenge: how to secure a workforce that operates across multiple locations, devices, and networks, without disrupting performance or productivity. This new reality has exposed the limitations of traditional security models. Legacy architectures rely on a clearly defined perimeter and […]