 
         Blog
Explore the latest in cyber security with CyberOne insights. Stay ahead with expert advice, Microsoft Security updates and real-world case studies to strengthen your cyber resilience.
- All Blog Posts
- Microsoft
- Cyber Attacks
- Cyber Security
- Penetration Testing
- Threat Intelligence
- Best Practice
- Managed Detection & Response (MDR)
- General
- Cyber Threats
- Cyber Hygiene
- Case Study
- IT Managed Services
- Security Operations Centre
- Data Security
- Certification
- Choosing a Provider
- Cloud Security
- Incident Response
- Network Transformation
- Budgets
- Artificial Intelligence
- Identity Management
- Extended Detection & Response (XDR)
- Zero Trust
- Governance, Risk & Compliance
- Internet Security
- Supply Chain Risk
Choosing a Provider, Managed Detection & Response (MDR), Extended Detection & Response (XDR)
October 30, 2025
Beyond The Cyber Buzzwords & Acroynms: What MXDR Really Means for Your Business
  Let’s be honest. Security teams love technical terms. But cyber awareness starts when we strip the buzzwords back and define them in human language. That way, leaders can make...
           
                      
                
         
            
            
            What’s the recommended network architecture requirement for Microsoft 365? Many enterprises have…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
01 February 2020
               
            
            
             
         
         
         
         
         Top Cyber Security Trends and Predictions for 2020
            
            
            Security experts have recently shared their predictions, warnings and best practices for the new…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
29 January 2020
               
            
            
             
         
         
         
         
         What is a Zero Trust Network?
            
            
            In the past 10 years, the network has changed, and security has changed. Both consumers and…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
21 January 2020
               
            
            
             
         
         
         
         
         Crest Accreditation: Why It’s Important for Penetration Testing
            
            
            Penetration testing is the cyber equivalent of letting someone break into your house and rummage…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
15 January 2020
               
            
            
             
         
         
         
         
         Threat Intelligence January 2020: 49 Vulnerabilities with 8 Rated Critical
            
            
            January 2020 Threat Intelligence (CRITICAL ALERT)
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
08 January 2020
               
            
            
             
         
         
         
         
         Top Reasons Why You Should Outsource IT Support in 2020
            
            
            You may have been led to believe that keeping your IT support department in-house is more efficient…
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
12 December 2019
               
            
            
             
         
         
         
         
         Threat Intelligence December 2019: 36 Vulnerabilities Including 7 Critical
            
            
            December 2019 Threat Intelligence (CRITICAL ALERT)
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
09 December 2019
               
            
            
             
         
         
         
         
         Threat Intelligence September 2019: 79 Vulnerabilities Including 17 Critical
            
            
            September 2019 Threat Intelligence (CRITICAL ALERT)
            
            
         
         
         
         
         
         
         
         
         
         
       
         
            
            
            
            
            
            
            
            
            
            
               
                  
06 December 2019
               
            
            
             
         
         
         
         
         6 Steps of a Successful Cyber Security User Awareness Programme
            
            
            Unfortunately, technology alone cannot protect you from cyber security attacks. You can have the…
            
            
         
         
         
         
         
         
         
         
         
         
      