What Are the Most Common Methods Used for Malware Attacks?

Similar to other hacking techniques, hackers using malware have a wide range of methods to gain access to data or steal money from their victim. These methods include the type of malware used, what the aim of the malware is, and how it’s installed on the victim’s computer. So what are the most common methods […]
In Conversation with NEBRC Student Alumni: Adam Taylor

We recently caught up with NEBRC student, Adam Taylor, who has just graduated from Northumbria University and has now left the NEBRC, and has started an exciting new role with one of our Cyber Essentials Partners Aspire Technology Solutions. The NEBRC student programme works in partnership with Sheffield Hallam, Northumbria, Leeds Beckett, Sunderland, Teesside and Durham […]
Five Ways Cyber Criminals Attack Businesses and How to Stop Them

Citation Cyber are on a mission to make cyber security simple and accessible for everyone. That’s why they partner with us, they help businesses like yours stay safe, informed and ahead of cyber threats with their latest blog. Here’s the thing: the biggest risks often come from the smallest cracks. A forgotten login. An old […]
Can Poor Cybersecurity Policies Disrupt Business Continuity?

A detailed cybersecurity policy is an essential part of any business continuity plan. It ensures that you’re adequately addressing any weaknesses that your business has, are prepared for potential threats, and are ready to mitigate an attack. While most business owners know that they need a cybersecurity policy, many don’t know the risks of a […]
What is the Most Common Form of Cyber Attack?

Cyber attacks come in many shapes and sizes, and the techniques used by cyber criminals are constantly evolving. Despite this, there is one technique that has remained the most common form of cyber attack for years, and it doesn’t look like slowing down any time soon. So what is the most common form of cyber […]
Are Your Social Posts Fuelling Cyber-Scams?

We all share online, whether it be birthdays, holiday photos, even our pets’ names – without a second thought. But that “harmless” detail could hand cyber-criminals exactly what they need. What is Social Engineering? Social engineering targets people, not computers. Attackers exploit trust and urgency, posing as someone you know or crafting realistic scenarios that […]
Behind the Scenes at the NEBRC: Meet the Team

At the North East Business Resilience Centre, our people are at the heart of everything we do. Our team protects businesses in the North East, Yorkshire and The Humber from online crime and fraud, so we’re proud to introduce a few of the faces that make our work so impactful. Here’s a behind-the-scenes glimpse into […]
How is a Vulnerability Assessment Done?

A vulnerability assessment is a systematic review of your business’s cyber security vulnerabilities. Its purpose is to identify any weaknesses in your systems that could be exploited, evaluate their risk and priority level, and recommend mitigation to any risks identified. Assessing these vulnerabilities is essential to ensuring that any risks identified can be dealt with […]
Watch Out! LinkedIn: A Hacker’s Playground?

LinkedIn might feel like a safe corner of the internet, but it’s quickly becoming a goldmine for cyber criminals. It’s where careers are made, business connections are built, and reputations shine. But behind the slick profiles and polite networking lies a growing cyber threat. Hackers are hijacking accounts, impersonating professionals, and slipping malware into inboxes […]
What Techniques Do Hackers Use to Steal Information?

There are a vast array of tools and techniques used by hackers to gain access to sensitive information that they can exploit or sell on to other criminals. With so many methods available, it can be difficult to protect your business without the correct knowledge or what to look out for. So what techniques do […]