-

Phishing and Social Engineering
|
Read more: Phishing and Social EngineeringMost successful attacks don’t begin with sophisticated technical exploits. They begin with a message (an email, a text, a phone call), designed to make someone do something they wouldn’t otherwise do. Phishing and social engineering remain among the most effective methods available to attackers precisely because they target human judgement rather than technical defences. The…
-

Password Best Practices
|
Read more: Password Best PracticesPasswords are still one of the most common ways systems are accessed, and one of the most common ways they’re compromised. The issue isn’t usually awareness, it’s habit, more specifically, the habits that well-intentioned rules have encouraged. Complex character requirements and frequent resets often lead to predictable patterns and passwords that look strong but aren’t.…
-

CYBERUK 2026 – what’s worth paying attention to
|
Read more: CYBERUK 2026 – what’s worth paying attention toEach year, CYBERUK sets the tone for how cyber security is expected to operate in practice – not just in policy terms, but in what organisations are actually held accountable for. This year’s theme, “The next decade: accelerating our cyber defence”, signals something that’s been building for a while. The conversation has moved on. The…
-

Security is a Product Decision: Why Secure by Design Starts with the Product Owner
|
Read more: Security is a Product Decision: Why Secure by Design Starts with the Product OwnerBy Beth Hurford, Senior Optimisation and Transformation Consultant, Logiq Picture this. You’re in a requirements workshop. There’s a business analyst (BA), a developer, maybe a systems engineer, and you, the product owner (PO). Security isn’t there. Someone decided it was “too early”, that involving them now would mean “too many cooks” and that security can…
-

Logiq acquires Savient Ltd to strengthen capability and expand presence in the South-West
|
Read more: Logiq acquires Savient Ltd to strengthen capability and expand presence in the South-WestBristol, UK – 01 April 2026 – Logiq, a fast-growing, NCSC-assured UK cyber security consultancy and secure solutions provider, has acquired Savient Ltd, a technology and data specialist focused on delivery in highly regulated environments, strengthening its capability and further expanding its presence in the South-West. Founded in 2018, Logiq has grown rapidly to a…
-

Cybersecurity: A discipline in search of a definition
|
Read more: Cybersecurity: A discipline in search of a definitionBy Matthew Mackay, Practice Lead and Principal Security Consultant, Logiq In an era where digital threats evolve faster than most organisations can adapt, you would be mistaken for believing that there would be a universally agreed definition for the term ‘cybersecurity’. Despite its increased profile and agreed importance, cybersecurity remains a concept without a single,…
-

What is the NCSC Cyber Advisor Scheme and do you need it?
|
Read more: What is the NCSC Cyber Advisor Scheme and do you need it?If you are preparing for Cyber Essentials certification, you may have come across the term “Cyber Advisor”. It is easy to assume it is another form of certification, or perhaps a mandatory step in the process. It is neither. The Cyber Advisor scheme was developed by the National Cyber Security Centre and is delivered in…
-

Logiq Recognised as NCSC Assured Cyber Advisor Service Provider
|
Read more: Logiq Recognised as NCSC Assured Cyber Advisor Service ProviderBristol, UK – 23 February 2026 – Logiq, a rapidly growing UK cyber security consultancy and secure solutions specialist has been recognised as an Assured Service Provider under the UK Cyber Advisor scheme, enabling the organisation to deliver cyber security advice formally aligned to National Cyber Security Centre (NCSC) standards. The Cyber Advisor scheme was…
-

Logiq recognised as a Microsoft Solutions Partner for Security
|
Read more: Logiq recognised as a Microsoft Solutions Partner for SecurityLogiq has been recognised as a Microsoft Solutions Partner for Security, reflecting our experience designing, delivering and operating secure systems in highly regulated environments. The Solutions Partner designation is awarded to organisations that can demonstrate proven capability across Microsoft’s security portfolio, supported by certified expertise and evidence of real-world delivery. It recognises organisations that apply…
-

CSRB and the Reality of OT and ICS
|
Read more: CSRB and the Reality of OT and ICSThe Cyber Security & Resilience Bill is being talked about as a major update to the UK’s regulatory landscape, but its impact won’t be felt in policy documents or compliance dashboards. It will be felt in the quiet corners of essential services where technology, process and people collide — places where systems were never designed…
-

How DISX Supports CSMv4 Readiness
|
Read more: How DISX Supports CSMv4 ReadinessPreparing for the enhanced Cyber Security Model has become a significant focus for suppliers working with the Ministry of Defence. While the policy intent is straightforward — raising the bar for cyber resilience across defence programmes — the practical reality can feel messy, especially for organisations without dedicated security teams. Much of the initial effort…
-

Delivering OFFICIAL and OFFICIAL-SENSITIVE work in practice
|
Read more: Delivering OFFICIAL and OFFICIAL-SENSITIVE work in practiceThere is sometimes a tendency to treat the terms OFFICIAL and OFFICIAL-SENSITIVE as purely administrative labels, but for organisations working with the Ministry of Defence they represent a set of expectations about how information should be handled and what the working environment needs to look like. What the classifications mean in day-to-day delivery These classifications…
