You can take all the defensive steps you can think of then there is a Zero-Day!

A zero-day attack refers to the gap between the “secret” launch of a cyber attack and the subsequent discovery of the attack and mitigation being available. In this gap your defences have not yet been updated because your security vendor is unaware there is problem. Your systems a laid bare for an attack to succeed and for your information to be breached and compromised.

This is the type of attack vector that excellent staff training will help defend against when your technical defences have been breached. Your people if they have been well briefed can respond to the changing threat landscape without having to wait for the new software patch.

Our training is carried out online so it is easy for people to join in wherever they are and for those that are already booked we record the session so they (and new starters) can catch up. We pride ourselves in making sure the training addresses your needs – we meet with you beforehand (again via Teams to save time and travel on both sides) to discuss what we will deliver and how we should adapt it for your circumstances. I always encourage questions during my presentations – I feel making people wait until the end means often their point is lost. Your training is important to me, years of experience in Adult Education Colleges means I can adapt my delivery to help people understand and not lose any essential content.

Human cyber defences start with the very top of the company and the culture they create. We have a range of training that can help a CEO, CIO, CSO, CISO and other board members understand why the culture of a company is an important weapon in their cyber arsenal and help them create policies, procedures and workflows to create a great business culture.

MIT has released a report studying the state of zero-day attacks and have concluded that 2021 (so far) has seen a serious increase in them:

The Proliferation of Zero-days MIT Report – Schneier on Security

Clive Catton MSc (Cyber Security) – by-line and other articles