Skip to main content

Cyber Security Blog

Article 10 November 2025 7 min read

Phishing Attacks Are Getting Harder to Spot — What Small Businesses Need to Know

Phishing is the top way attackers breach small business networks. Learn how modern phishing works and what actually stops it in 2025.

Phishing Small Business Security Email Security
Read article
Article 3 November 2025 7 min read

What Does a Data Breach Actually Cost a Small UK Business?

A data breach costs far more than the ICO fine. See the full cost breakdown for UK small businesses with under 100 employees.

Data Breach Small Business Security ICO
Read article
Article 27 October 2025 8 min read

Cyber Essentials Certification: The Complete Guide for UK Small Businesses

Everything UK small businesses need to know about Cyber Essentials certification: cost, coverage, timelines and insurance benefits.

Cyber Essentials Small Business Security UK Compliance
Read article
Article 20 October 2025 8 min read

Ransomware and Small UK Businesses: What You Actually Need to Know

Ransomware attacks on small UK businesses are rising. A plain-English guide to how it works, what it costs and what actually stops it.

Ransomware Small Business Security Cyber Threats
Read article
Article 13 October 2025 7 min read

What Is a Security Operations Centre? A Plain-English Guide

A plain-English guide to what a Security Operations Centre (SOC) actually is, what it does, and why small UK businesses now have access to one. No jargon.

SOC Small Business Security Cyber Security Basics
Read article
Article 6 October 2025 9 min read

What We Learned Building SOC in a Box

Ten weeks of development diary concludes with the honest account: what we got right, what we got wrong, and what SOC in a Box looks like now it's live.

SOC in a Box Development Diary Lessons Learned
Read article
Article 29 September 2025 8 min read

Five Days: From Order to 24/7 Monitoring — How the Deployment Actually Works

Most SOC deployments take months. SOC in a Box takes five working days. Here's exactly what happens on each of those days — and why the timeline is achievable.

SOC in a Box Development Diary Deployment
Read article
Article 22 September 2025 6 min read

The Confidence Score: One Number That Tells Your Board How Protected You Are

The Confidence Score gives your board one clear number on cyber security posture. Built for decision-makers, not engineers.

SOC in a Box Development Diary Confidence Score
Read article
Article 15 September 2025 7 min read

Why Every SOC in a Box Client Gets a Named Analyst, Not a Ticket Queue

Every SOC in a Box client gets a named security analyst who knows their environment. Learn why we chose this over a ticket queue.

SOC in a Box Development Diary Analyst Model
Read article
Article 8 September 2025 6 min read

DecoyPulse: Deception Technology That Generates Zero False Positives

DecoyPulse brings deception technology to small businesses. If something touches a decoy, it shouldn't be there. Zero false positives by design.

SOC in a Box Development Diary DecoyPulse
Read article
Article 1 September 2025 7 min read

EmilyAI: The Triage Layer That Keeps Human Analysts Focused on Real Threats

EmilyAI pre-processes and enriches alerts before they reach human analysts. Learn why AI triage matters more for small organisations.

SOC in a Box Development Diary EmilyAI
Read article
Article 25 August 2025 7 min read

The Same Engine: Integrating SOC365 With a Compact Sensor

How SOC in a Box connects to our enterprise SOC365 platform with zero compromise on detection quality. The architecture explained.

SOC in a Box Development Diary SOC365
Read article