Blog Posts
- Home /
- Blog Posts

93% of UK CNI Organisations Got Cyber Attacked Last Year: The Basics Are Still Broken
The confidence paradox Ninety-eight percent of UK critical national infrastructure organisations say they are cyber resilient. That figure comes from …
Read More
Pen Testing Lessons Hollywood Accidentally Taught You
Hollywood loves a good hack. Hooded figure, green text, countdown timer that stops at 00:01. Great cinema. Terrible cybersecurity.
Read More
Why Penetration Testing is Our Bread and Butter
We’re excited to announce that we are returning to our roots by adding Penetration Testing to Echo Secure’s core service suite.
Read More
A Penetration Test in 24 Hours, Is it Possible?
It usually happens at 4:30 PM on a Friday; a major prospect suddenly demands a pen test report before they’ll sign the contract, or a compliance …
Read More
Cyber Security Awareness Month: October 2025
Cyber Resilience Isn’t Just for Corporations — It’s Essential for Your SME October is Cyber Security Awareness Month, a time for every …
Read More
Mandatory Cyber Essentials Certification for Legal Aid Firms
The Mandatory Cyber Security Standard for Criminal Legal Aid Contracts From 1 October 2025, the Legal Aid Agency will require every law firm holding a …
Read More
Adversarial Phishing Simulations - an MSP Guide to Going Beyond Compliance
The Crucial Role of MSPs In the rapidly evolving digital landscape, the wrong click can be devastating. Phishing attacks are still the most prolific …
Read More
Phishing Risks in the Legal Sector
Phishing attacks persist as one of the most significant and evolving risks to the legal sector. The very foundations of trust and confidentiality that …
Read More
Top 10 Phishing Threats Happening Right Now
Phishing attacks are showing no signs of slowing down; they are getting smarter, more convincing and harder to spot. Cybercriminals are using advanced …
Read More
Alarming Surge in Vishing and AI Driven Attacks
Vishing and AI driven phishing operations are on the up, rising at dramatic levels, as cybercriminals deploy increasingly sophisticated social …
Read More
Kurtis Baron