From 26th April 2026, a significant update to the Cyber Essentials scheme known as the Danzell update will come into effect. While the standard remains a vital benchmark for cyber hygiene, the update introduces stricter controls, deeper validation, and greater clarity in how requirements must be demonstrated.
Passwords remain one of the most common entry points for cyber attacks. Despite advances in authentication technologies, compromised credentials continue to play a major role in data breaches, ransomware incidents, and account takeovers. This article explains what you can do to help, and includes the top 10 tips for creating secure passwords and a password strength checker so this page can be shared with your users to help them understand and adopt good practices.
Secure your personal data We are all personally, ransomware targets, so we're taking the time to offer some top tips, that each and every one of us can follow to protect our personal data from a ransomware attack. Imagine turning on your computer to find a startling message: all your files - family photos, tax documents, everything - are locked. You cannot open a single one. To get them back, a stranger on the internet is demanding hundreds of pounds. This isn’t a scene from a movie; it’s a real and increasingly common threat called ransomware.
Cyber security in action: trends, threats, and how to defend your organisation (webinar) Join Mike Mann, Cyber Security Specialist, Phil Nixon, Cyber Security Presales Consultant, and Paul Colwell, Wavenet CISO, for an engaging webinar exploring the latest trends in cyber security and practical strategies to safeguard your business.
Have you carried out your penetration testing yet? Whether the answer is yes or no, it’s vital to ask whether you’re testing the right things - or simply making assumptions.
With cyber threats posing a serious risk to businesses of all sizes, attackers are constantly probing networks, applications, and systems for weaknesses - and unless organisations take proactive steps to identify and remediate those vulnerabilities, costly data breaches are increasingly likely.
With cyber security threats evolving at an unprecedented pace - businesses face constant challenges in safeguarding their data and systems. Managed Security Operations Centres (SOCs) offer a solution to these challenges. They provide round-the-clock monitoring and management of security incidents. This service is crucial for businesses aiming to protect their assets.
The real threat to mobile apps isn’t the app, it’s API security. Chris Watt, an experienced Wavenet penetration tester, discusses mobile security…
Ensuring the security and availability of your online services is paramount. Distributed Denial of Service (DDoS) attacks pose a significant threat to businesses of all sizes, making robust DDoS protection and mitigation services crucial. This article will guide you through the essentials of DDoS protection services, how they work, and why they are vital for safeguarding your digital assets.
Get all the latest news and insights straight to your inbox.