Recyber Empowers Directors Navigate the UK’s Cyber Governance Code of Practice with Confidence The UK’s Cyber Governance Code of Practice, introduced on 8th April 2025, emphasises the pivotal role of directors in managing cyber risks. Recyber’s Republic is designed to support directors in meeting these responsibilities effectively. Key Features of Republic Risk management alignment Provides […]
Background A mid-sized London Accounting firm specialising in tax consulting and financial advisory, for UK and US/EMEA clients, faced a growing concern regarding cyber threats. With an increase in phishing attempts and social engineering attacks targeting the financial sector, the firm needed a robust solution to improve cybersecurity awareness among employees. Protecting sensitive client data […]
Cultivating Cyber Secure Behaviour in Education From widening access to information, to remote learning and accessibility, technology has had many positive influenceson the education sector. However, the emergence of new technology has inadvertently created novel ways for attackers to conduct theirfraudulent activity, whether that be against schools, staff, or students. As a result, the […]
Cultivating Cyber Secure Behaviour in Finance Technology has revolutionised the way the finance industry operates, giving significantly greater control to the end-user over their finances. However, the digitisation and automation of the finance sector has inadvertently created novel ways for attackers to conduct their fraudulent activity , whether that be against the individual and/or the […]
Protect your people, clients and bottom line with Republic – Small Business Edition Sign Up Now Developed by Recyber, Republic is an advanced Behavioural Detection and Response (BDR) platform designed to enhance organisational cybersecurity by focusing on human behaviour. Recyber recognises that small businesses need to make every penny count. From as little as £199 […]
Believe it…despite the best technical defences, if the human is not secure then the system isn’t either Real-world example: 2016 Democratic National Committee (DNC) hack. Phishing Tactics Hackers sent phishing emails to several DNC staff members, masquerading as Google security warnings. • The emails claimed there was suspicious activity on their Google accounts and urged […]
Believe it…your data is at risk, so be careful who you choose to share it with. Real-world example: 2020 MGM Resorts Data Breach In 2020, hackers obtained a database containing the personal information of over 142 million MGM Resorts guests and posted it for sale on a dark web marketplace. The data included names, addresses, […]
Not quite…the Twitter accounts of several high-profile influencers were accessed to facilitate a widespread social engineering attack. Not everyone is who they say they are. Real-world example: 2020 Twitter Bitcoin Scam In July 2020, attackers gained access to Twitter’s internal tools and compromised several high-profile accounts, including those of Elon Musk, Jeff Bezos, Barack Obama, […]
A great example of a phishing attack is a “spoofed email from a trusted company.” Below is a detailed scenario: Example “Your Bank Account Needs Verification” Scenario An attacker sends an email that appears to come from a legitimate bank, like Wells Fargo or Chase. The email is designed to exploit the recipient’s trust by […]
Believe it…there are many types of cyberattacks where https could have prevented or mitigated the attack, primarily those involving Man-in-the-Middle (MITM) attacks. Real-world example: The Firesheep Attack What Happened? Firesheep was a browser extension that allowed attackers to hijack user sessions on websites that did not enforce https for all communications. The Mechanism Firesheep exploited […]