top of page
![SG_2020_INSIGHTS_HERO.jpg](https://static.wixstatic.com/media/c8c062_777344814610448580e51ff68685f79d~mv2.jpg/v1/fill/w_980,h_463,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/c8c062_777344814610448580e51ff68685f79d~mv2.jpg)
Cyber security insights
STORM's cyber security insights bring you all the latest trends in digital security, cyber insurance, incident response and more
STORM Guidance blog
See what our specialists have to say about ransomware, business email compromise, extortion, data theft and all aspects of cyber risk.
Neil Hare-Brown
Oct 14, 2024
Webinar - Cyber Risk Assessment
The importance of cyber risk assessments in today's threat landscape.
Neil Hare-Brown
Sep 11, 2024
Webinar - Cyber Incident Exercising
Neil Hare-Brown and Mark Saunders from STORM are joined by Bores MD, James Bore to discuss the importance of cyber incident exercising.
![](https://static.wixstatic.com/media/3ebb30_2b7041d2fb524876a9f8860bb65225ad~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_2b7041d2fb524876a9f8860bb65225ad~mv2.webp)
![Webinar - How can we trust IT solutions vendors?](https://static.wixstatic.com/media/3ebb30_2b7041d2fb524876a9f8860bb65225ad~mv2.jpg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_2b7041d2fb524876a9f8860bb65225ad~mv2.webp)
Neil Hare-Brown
Aug 15, 2024
Webinar - How can we trust IT solutions vendors?
Learning in the wake of the CrowdStrike and similar incidents.
![](https://static.wixstatic.com/media/3ebb30_f38976e5aa83457c9ad058bc2e87d528~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_f38976e5aa83457c9ad058bc2e87d528~mv2.webp)
![Webinar - Anatomy of a Global IT Issue](https://static.wixstatic.com/media/3ebb30_f38976e5aa83457c9ad058bc2e87d528~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_f38976e5aa83457c9ad058bc2e87d528~mv2.webp)
Neil Hare-Brown
Aug 1, 2024
Webinar - Anatomy of a Global IT Issue
A deep and wide, cause and effect analysis on what we know so far on the CrowdStrike incident.
![Webinar - What Good Looks Like. Ep 1: Cyber Incident Response](https://static.wixstatic.com/media/3ebb30_842105d7409a43beb8aeae6fd59be094~mv2.png/v1/fill/w_317,h_178,fp_0.50_0.50,q_95,enc_auto/3ebb30_842105d7409a43beb8aeae6fd59be094~mv2.webp)
Neil Hare-Brown
Jul 16, 2024
Webinar - What Good Looks Like. Ep 1: Cyber Incident Response
Business leaders need trust in those who offer cyber services. This series provides advice when performing due diligence on such providers.
![Controls Degradation](https://static.wixstatic.com/media/ecb2fe_8765ef43ec8a42af86ef561a62435b0a~mv2.png/v1/fill/w_316,h_178,fp_0.50_0.50,q_95,enc_auto/ecb2fe_8765ef43ec8a42af86ef561a62435b0a~mv2.webp)
Neil Hare-Brown
Apr 28, 2024
Controls Degradation
After a 40 year career in cyber risk management, I have had the privilege to work with a range of professionals specialising in law...
![STORM is among the first NCSC Cyber Incident Exercising Assured Service Providers](https://static.wixstatic.com/media/ecb2fe_83b8c12a7f474abc80b71aec598a1bdb~mv2.png/v1/fill/w_317,h_178,fp_0.50_0.50,q_95,enc_auto/ecb2fe_83b8c12a7f474abc80b71aec598a1bdb~mv2.webp)
Neil Hare-Brown
Dec 5, 2023
STORM is among the first NCSC Cyber Incident Exercising Assured Service Providers
London, UK – 5 December 2023 – STORM Guidance, a leading provider of cyber incident response and cyber risk management services, today...
![](https://static.wixstatic.com/media/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.jpg/v1/fill/w_232,h_232,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.webp)
![The Epic Fail Behind MOVEit](https://static.wixstatic.com/media/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.jpg/v1/fill/w_303,h_166,fp_0.50_0.50,q_90,enc_auto/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.webp)
Neil Hare-Brown
Aug 2, 2023
The Epic Fail Behind MOVEit
The attack on MOVEit is a replay of similar breaches which expose poor data management practices. For some time now, threat actors have...
![](https://static.wixstatic.com/media/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.webp)
![Cyber attack methods explained, with a twist!](https://static.wixstatic.com/media/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.jpg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.webp)
Neil HB
Apr 6, 2023
Cyber attack methods explained, with a twist!
Learn about the ways in which cyber criminals attack businesses, using Arthurian legend analogies.
![](https://static.wixstatic.com/media/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.webp)
![Royal Mail Ransomware Negotiation Analysis](https://static.wixstatic.com/media/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.webp)
Neil Hare-Brown
Mar 31, 2023
Royal Mail Ransomware Negotiation Analysis
STORM Guidance analyse the recent ransomware negotiation between Royal Mail and LockBit. Download the full report here.
![](https://static.wixstatic.com/media/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.webp)
![How MSPs can better position themselves in the face of increasing cyber threat](https://static.wixstatic.com/media/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.webp)
Rosanna Hayes
Jan 11, 2023
How MSPs can better position themselves in the face of increasing cyber threat
This article seeks to define the value in acknowledging and supporting the division between MSPs and cyber incident response roles and...
![](https://static.wixstatic.com/media/3ebb30_813665434b674662b42d847de2825885~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_813665434b674662b42d847de2825885~mv2.webp)
![UK cyber crisis calls for broader regulation in the face of economic gloom](https://static.wixstatic.com/media/3ebb30_813665434b674662b42d847de2825885~mv2.jpg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_813665434b674662b42d847de2825885~mv2.webp)
Rosanna Hayes
Nov 17, 2022
UK cyber crisis calls for broader regulation in the face of economic gloom
Amid countless reports of data leaks, hacks, and fraud, the UK economy isn’t adapting to deal with the pace of cybercrime, as threat...
![](https://static.wixstatic.com/media/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.webp)
![Behind the scenes of criminal black markets and the proliferation of data extortion](https://static.wixstatic.com/media/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.webp)
Rosanna Hayes
Nov 1, 2022
Behind the scenes of criminal black markets and the proliferation of data extortion
The rapid evolution of cyberattack methods in recent years has shifted the focus to “big-game hunting”, targeting high-value victims with...
![Quantify cyber risk across your book and save the prop-form headache](https://static.wixstatic.com/media/3ebb30_66f37f070017486a8326da4b08e0fc98~mv2.png/v1/fill/w_317,h_178,fp_0.50_0.50,q_95,enc_auto/3ebb30_66f37f070017486a8326da4b08e0fc98~mv2.webp)
Rosanna Hayes
Oct 14, 2022
Quantify cyber risk across your book and save the prop-form headache
This month STORM Guidance launched the latest development to its pioneering risk assessment service, Cyber3: Rapid Risk Review. The...
![](https://static.wixstatic.com/media/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.webp)
![Risk Management Regulations Set to Hit the Cyber Market](https://static.wixstatic.com/media/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.jpeg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.webp)
Rosanna Hayes
Oct 7, 2022
Risk Management Regulations Set to Hit the Cyber Market
What is the NCSC's proposed security standard, and do these controls go far enough for accurate risk modelling and loss reduction?
bottom of page