Cyber Security Blog
Building the Box: Hardware Decisions for a Hardened SOC Appliance
What goes inside a SOC in a Box appliance? From form factor to encryption, here's every hardware decision we made — and why we made it.
The Idea: What If We Could Put a SOC in a Box?
SOC in a Box started from a pattern in incident response callouts. Learn how the idea went from concept to a fully built product.
Why Small Organisations Can't Get a Real SOC — And Why That's Wrong
The cybersecurity industry has spent years telling SMBs they don't qualify for a proper SOC. We decided to prove that wrong. Here's why we started building.
Your Small Business Cyber Security Checklist: 50 Controls to Have in Place
The complete cyber security checklist for UK small businesses. 50 practical controls across 10 categories. Use it, share it, act on it.
Understanding Your Cyber Risk: A Simple Approach for Business Owners
Cyber risk doesn't need a complex framework. Learn how to assess your specific risk, prioritise your response and know when to get expert help.
Remote and Hybrid Working: Keeping Your Business Secure Off-Premises
Remote working is here to stay. This guide covers VPNs, home network risks, cloud security and the threats targeting remote workers.
Security Awareness Training: Making Your Team Your Strongest Defence
Staff who understand cyber threats are harder to compromise. What effective security awareness training looks like for small businesses.
Managing User Access: Who Can Get to What — and Why It Matters
Least privilege access is one of the most effective cyber controls. Learn how to manage user access practically in a small business.
Physical Security: The Cyber Risk You Can See
Unlocked screens, unattended devices and tailgating create cyber risks no firewall can stop. Practical physical security basics for businesses.
Mobile Device Security for Small Businesses
Mobile devices hold business email, files and credentials but get less security attention. Essential mobile security controls for small businesses.
Safe Browsing and Web Security for Your Business
The web is the second most common malware delivery method. Learn browser security settings, DNS filtering and safe browsing for businesses.
Email Security Basics Every Small Business Should Have in Place
Email is the top entry point for cyber attacks on small businesses. Learn about DMARC, spam filtering, safe links and staff training.