Protect Yourself Against the Next Big Cyber Attack: AI

AI

Cyber security is an essential part of any business. This starts with being aware of the latest threats such as AI cyber attacks. In this blog, we discuss how AI can be used in malicious ways, even by unsuspecting users. So what do you need to know about AI cyber attacks? AI attacks occur when […]

What is an Example of Fraud Prevention Control?

Fraud prevention

Fraud prevention control is the policies and procedures a business has in place to stop fraud from occurring, saving the business from a very costly situation. In this blog, we discuss how to create an effective fraud prevention control strategy for your business, identifying potential areas of weakness. So what is an example of fraud […]

What Are the Benefits of Cyber Resilience? 

While the number of attempted cyber attacks is constantly growing, many businesses aren’t well equipped to deal with them and aren’t sure how building cyber resilience can help. We’ve created this guide to help you understand the benefits of cyber resilience. So what are the benefits of cyber resilience? The top benefits of cyber resilience […]

What Are the Most Common Methods Used for Malware Attacks?

Similar to other hacking techniques, hackers using malware have a wide range of methods to gain access to data or steal money from their victim. These methods include the type of malware used, what the aim of the malware is, and how it’s installed on the victim’s computer.  So what are the most common methods […]

In Conversation with NEBRC Student Alumni: Adam Taylor

We recently caught up with NEBRC student, Adam Taylor, who has just graduated from Northumbria University and has now left the NEBRC, and has started an exciting new role with one of our Cyber Essentials Partners Aspire Technology Solutions. The NEBRC student programme works in partnership with Sheffield Hallam, Northumbria, Leeds Beckett, Sunderland, Teesside and Durham […]

Can Poor Cybersecurity Policies Disrupt Business Continuity?

A detailed cybersecurity policy is an essential part of any business continuity plan. It ensures that you’re adequately addressing any weaknesses that your business has, are prepared for potential threats, and are ready to mitigate an attack.  While most business owners know that they need a cybersecurity policy, many don’t know the risks of a […]

What is the Most Common Form of Cyber Attack?

Man typing on computers

Cyber attacks come in many shapes and sizes, and the techniques used by cyber criminals are constantly evolving. Despite this, there is one technique that has remained the most common form of cyber attack for years, and it doesn’t look like slowing down any time soon. So what is the most common form of cyber […]

Are Your Social Posts Fuelling Cyber-Scams?

We all share online, whether it be birthdays, holiday photos, even our pets’ names – without a second thought. But that “harmless” detail could hand cyber-criminals exactly what they need. What is Social Engineering? Social engineering targets people, not computers. Attackers exploit trust and urgency, posing as someone you know or crafting realistic scenarios that […]

Behind the Scenes at the NEBRC: Meet the Team

At the North East Business Resilience Centre, our people are at the heart of everything we do. Our team protects businesses in the North East, Yorkshire and The Humber from online crime and fraud, so we’re proud to introduce a few of the faces that make our work so impactful. Here’s a behind-the-scenes glimpse into […]

How is a Vulnerability Assessment Done?

typing on laptop

A vulnerability assessment is a systematic review of your business’s cyber security vulnerabilities. Its purpose is to identify any weaknesses in your systems that could be exploited, evaluate their risk and priority level, and recommend mitigation to any risks identified. Assessing these vulnerabilities is essential to ensuring that any risks identified can be dealt with […]