Best Practice

A close-up of a dandelion with seeds, showcasing the delicate beauty of nature's dispersal mechanism.

Critical security bulletin: Palo Alto Networks Vulnerability PAN-SA-2024-0015

Discover how to protect your business from the growing threat of fake invoice scams.

Read more
Reliance Cyber Security leveraging ingestion based security thought leadership ebook cover and inside spread on a blue background

Best security practices – Messaging & social media platforms

In our Security E-Book, we cut through the noise to deliver clear, actionable advice on how to stay cyber secure when using messaging and social media platforms.

Read more
a venus fly trap close up

Spotting and stopping fake invoice scams

Discover how to protect your business from the growing threat of fake invoice scams.

Read more
lights speeding past, blurred in navy and blue

2023 Cybersecurity recap: Critical breaches and 2024 strategy insights

Discover key cybersecurity insights from 2023, including major breaches and attacks, in the latest article, written by Reliance Cyber’s threat intelligence team.

Read more
a document being signed

The problem of collaboration – does the modern working environment requiring a new approach to Data Loss Prevention?

The modern post-Covid workplace has created an unstoppable drive for more collaboration and productivity tools.…

Read more
a cyborg in a thinking pose

Privacy and AI

Privacy and AI: how do you balance innovation and protecting personal data Artificial Intelligence (AI)…

Read more
a cyborg human-like robot on a blurred background indicating AI

Privacy and AI: how do you balance innovation and protecting personal data

Artificial Intelligence (AI) has become an increasingly hot topic in recent months. While some famous…

Read more
computer screens

Endpoint Detection and Response (EDR) – Common Pitfalls

A common strand of activity for us here at Reliance Cyber surrounds Incident Response; helping…

Read more
a computer circuit board

Privacy-Enhancing Technologies (PETs) – shortcut to compliance or road to ruin?

In September, the UK Information Commissioner’s Office (ICO) issued new guidance on privacy-enhancing technologies (PETs).…

Read more
a hand on a dark background holding floating envelopes indicating emails

What is Business Email Compromise – and why it is so dangerous?

Many organisations cover phishing attacks in their cyber security training, and most employees are familiar…

Read more

Book your free 30-minute cyber security consultation