Cyber insurance premiums for UK businesses have risen sharply in recent years. Insurers are tightening underwriting requirements, increasing excesses, and in some cases refusing cover altogether - particularly for organisations with weak cyber security controls.
For years, organisations have measured their cyber maturity by how well they prevent incidents. How many controls are in place. How many standards are met. How clean the audit looks.
Organisations often use the terms MDR, SIEM, and SOC interchangeably, but they are not the same thing. While all three relate to cyber security monitoring and response, they serve different purposes and levels of operational maturity. Understanding the differences is essential for UK organisations looking to improve threat detection and response.
Artificial intelligence is accelerating innovation, but it is also reshaping the cyber threat landscape faster than most organisations expect. From highly convincing phishing campaigns to deepfake impersonation and hidden AI-driven manipulation, the assumptions that once underpinned cyber security are no longer reliable.
This Q&A answers the most common and critical questions raised during our Secure AI in Action webinar. It explores how AI is reshaping the cyber risk landscape, where organisations are most exposed, and what practical steps leaders can take to defend the business while enabling responsible AI adoption. If you are looking for a broader view of how AI is driving these changes and what organisations must do next, we explore this in more detail in our companion article, Secure AI in action: how AI is reshaping cyber risk and what organisations must do next.
Remote and hybrid working are now standard across many industries. While this shift has delivered flexibility and productivity gains, it has also expanded the attack surface for cyber criminals. Home networks, personal devices, cloud platforms, and collaboration tools all introduce new risks.
From 26th April 2026, a significant update to the Cyber Essentials scheme known as the Danzell update will come into effect. While the standard remains a vital benchmark for cyber hygiene, the update introduces stricter controls, deeper validation, and greater clarity in how requirements must be demonstrated.
Passwords remain one of the most common entry points for cyber attacks. Despite advances in authentication technologies, compromised credentials continue to play a major role in data breaches, ransomware incidents, and account takeovers. This article explains what you can do to help, and includes the top 10 tips for creating secure passwords and a password strength checker so this page can be shared with your users to help them understand and adopt good practices.
The UK legal sector faces some of the most serious cyber threats of any industry. Law firms handle large volumes of sensitive, high-value information - including client data, case files, financial transactions, evidence bundles and privileged communications. This makes legal practices exceptionally attractive targets for cybercriminals, organised crime groups, and nation‑state threat actors.
Get all the latest news and insights straight to your inbox.