
Blog
Explore the latest in cyber security with CyberOne insights. Stay ahead with expert advice, Microsoft Security updates and real-world case studies to strengthen your cyber resilience.
- All Blog Posts
- Microsoft
- Penetration Testing
- Best Practice
- Cyber Attacks
- Threat Intelligence
- Cyber Security
- Cyber Threats
- General
- Cyber Hygiene
- IT Managed Services
- Managed Detection & Response (MDR)
- Security Operations Centre
- Certification
- Cloud Security
- Case Study
- Network Transformation
- Choosing a Provider
- Budgets
- Data Security
- Incident Response
- Zero Trust
- Artificial Intelligence
- Extended Detection & Response (XDR)
- Internet Security
- Supply Chain Risk
Security Operations Centre
May 8, 2025
Stories From The SOC: When Kebabs Crypto and (Attempted) Compromise Collide
By Lewis Pack, Head of Cyber Defence, CyberOne Welcome back to Stories from the SOC, where we lift the lid on real cyber threats, responses and lessons learned inside CyberOne's...


It is no wonder that so many organisations are migrating to Microsoft 365, with clear user benefits…

14 August 2018
Why is Security Patch Management So Important?
Over the last year, we’ve observed some of the largest cyberattacks in history, with the WannaCry…

10 August 2018
The 5 Best Third-Party Patching Tips & Strategies
For many businesses, the discipline of patching only extends to operating system-level patching.…

08 August 2018
Zscaler Deployment Guide – Insider Tips for Deploying Zscaler
Built 100% in the cloud, Zscaler delivers your 'Security Stack-as-a-Service' from the cloud - where…

01 August 2018
8 Ways to Maintain Your Data Security When Working With Remote Teams
Remote teams are the biggest security risk to your organisation. The threats can be underestimated…

13 June 2018
Is Ransomware Really the Biggest Threat to Your IT Security?
As we've seen in the news with WannaCry and Petya/NotPetya, it is no surprise that ransomware is a…

01 May 2018
Facing The Mobile Security Threat - Mobile Malware Statistics 2017
In the not-too-distant past, mobile security was not considered a security threat, nor was it even…

17 April 2018
How Often Should You Do a Cyber Security Audit & Who Should Do It?
Many companies assume their systems are secure, but this isn’t easy to know without regular,…

12 April 2018
Types of Penetration Test - What’s The Difference?
Penetration Testing has become a vital part of a modern vulnerability management programme. Just…