Skip to content

'Tips & Best Practices' posts

Cybersecurity Strategy, Legal, Tips & Best Practices | March 23, 2026

Cybersecurity for Law Firms: How to Secure Legal Documents Across Their Entire Lifecycle

Read full post

Fortifi Insights, Penetration Testing, Tips & Best Practices | 18 March 2026

Are You Testing The Same Things Every Year? Here Is Why That Is A Problem

Read full post

Fortifi Insights, Cybersecurity Strategy, Penetration Testing, Tips & Best Practices | 16 March 2026

We’ll Test Once We’re More Secure: The Jekyll & Hyde Approach to Penetration Testing

Read full post

Cybersecurity Strategy, Industry Insights, Legal, Tips & Best Practices | 13 March 2026

How Law Firms Can Avoid a Tax-Season Data Breach

Read full post

What Are Micro Red Team Engagements?

Read full post

What is the Pentest Trap? How Routine Testing Creates False Security

Read full post

Start Your Cyber Security Journey: Why Any Pen Test Beats No Pen Test

Read full post

Holiday Cyber Security Checklist: Protecting Your Business Over Christmas

Read full post

The 10 Biggest Cybersecurity Gaps in UK Schools (And How to Fix Them in 2026)

Read full post

Penetration Testing: Outside-In vs Inside-Out (Which One Does Your Business Actually Need?)

Read full post

Cybersecurity for Schools: A Headteacher’s Guide to Protecting Your Community

Read full post

Supply Chain Cyber Attacks: Why Your Supplier’s Problem Becomes Yours

Read full post

What Small Businesses Can Learn from the Jaguar Land Rover Cyber Attack

Read full post

You Can’t Outsource Responsibility: The Real Cost of Vendor Cyber Attacks

Read full post

What is the Pentest Trap? How Checkbox Security Fails Your Business

Read full post

The Importance of Retesting After Fixing Cybersecurity Vulnerabilities

Read full post

5 Tips for Creating an Effective Cybersecurity Policy

Read full post

How to Respond to a Data Breach: Step-by-Step Guide

Read full post

How to Develop an Incident Response Plan

Read full post

5 Reasons Why Cyber Security Training is Important

Read full post

Top 5 Benefits of Regular Vulnerability Assessments

Read full post

Ransomware: 7 Ways to Protect Your Business

Read full post

Operating Systems: Why is it Important to Keep Them Updated?

Read full post

Essential Guide to Annual Pentests: Why They’re Vital for Your Security

Read full post

Legacy Equipment: Understanding the Risks and Challenges

Read full post

Non-Perfect Cybersecurity: What is it and Why is it Common?

Read full post

What is the OWASP Top 10?

Read full post

Getting The Basics Right

Read full post

Losing the Keys to the Kingdom

Read full post

Passwords Passwords Passwords

Read full post