Skip to main content

Cyber Security Blog

Article 18 August 2025 8 min read

Building the Box: Hardware Decisions for a Hardened SOC Appliance

What goes inside a SOC in a Box appliance? From form factor to encryption, here's every hardware decision we made — and why we made it.

SOC in a Box Development Diary Hardware
Read article
Article 11 August 2025 14 min read

The Idea: What If We Could Put a SOC in a Box?

SOC in a Box started from a pattern in incident response callouts. Learn how the idea went from concept to a fully built product.

SOC in a Box Development Diary Product Design
Read article
Article 4 August 2025 6 min read

Why Small Organisations Can't Get a Real SOC — And Why That's Wrong

The cybersecurity industry has spent years telling SMBs they don't qualify for a proper SOC. We decided to prove that wrong. Here's why we started building.

SOC in a Box SMB Security Development Diary
Read article
Article 28 July 2025 10 min read

Your Small Business Cyber Security Checklist: 50 Controls to Have in Place

The complete cyber security checklist for UK small businesses. 50 practical controls across 10 categories. Use it, share it, act on it.

Cyber Security Fundamentals Security Checklist Small Business Security
Read article
Article 21 July 2025 7 min read

Understanding Your Cyber Risk: A Simple Approach for Business Owners

Cyber risk doesn't need a complex framework. Learn how to assess your specific risk, prioritise your response and know when to get expert help.

Cyber Security Fundamentals Cyber Risk Risk Assessment
Read article
Article 14 July 2025 7 min read

Remote and Hybrid Working: Keeping Your Business Secure Off-Premises

Remote working is here to stay. This guide covers VPNs, home network risks, cloud security and the threats targeting remote workers.

Cyber Security Fundamentals Remote Working Hybrid Working
Read article
Article 7 July 2025 7 min read

Security Awareness Training: Making Your Team Your Strongest Defence

Staff who understand cyber threats are harder to compromise. What effective security awareness training looks like for small businesses.

Cyber Security Fundamentals Security Awareness Staff Training
Read article
Article 30 June 2025 7 min read

Managing User Access: Who Can Get to What — and Why It Matters

Least privilege access is one of the most effective cyber controls. Learn how to manage user access practically in a small business.

Cyber Security Fundamentals Access Control Least Privilege
Read article
Article 23 June 2025 6 min read

Physical Security: The Cyber Risk You Can See

Unlocked screens, unattended devices and tailgating create cyber risks no firewall can stop. Practical physical security basics for businesses.

Cyber Security Fundamentals Physical Security Small Business Security
Read article
Article 16 June 2025 6 min read

Mobile Device Security for Small Businesses

Mobile devices hold business email, files and credentials but get less security attention. Essential mobile security controls for small businesses.

Cyber Security Fundamentals Mobile Security BYOD
Read article
Article 9 June 2025 6 min read

Safe Browsing and Web Security for Your Business

The web is the second most common malware delivery method. Learn browser security settings, DNS filtering and safe browsing for businesses.

Cyber Security Fundamentals Web Security Safe Browsing
Read article
Article 2 June 2025 7 min read

Email Security Basics Every Small Business Should Have in Place

Email is the top entry point for cyber attacks on small businesses. Learn about DMARC, spam filtering, safe links and staff training.

Cyber Security Fundamentals Email Security Phishing
Read article