-

Data Handling and Sharing
|
Read more: Data Handling and SharingData is handled constantly, often without much conscious thought. Files sent by email, documents saved to shared drives, information passed on in a conversation or a screenshot. Most of the time this happens without consequence. But the habits formed around routine data handling determine what happens when something goes wrong, or when data ends up…
-

Recognising and Responding to a Security Incident
|
Read more: Recognising and Responding to a Security IncidentSecurity incidents happen. They happen to organisations with mature security programmes, experienced teams, and robust controls. The measure of a security posture is not only how well it prevents incidents but how effectively it responds when prevention falls short. Knowing what to do in the first moments after something goes wrong matters. Delayed or poorly…
-

When version control slips on MOD construction projects
|
Read more: When version control slips on MOD construction projectsDrawings standing still on construction projects is a very rare thing indeed. They move through constant cycles of issue, review, mark-up, and revision. On MOD programmes, that process involves multiple contractors and subcontractors, often working across different systems and environments, each with their own document practices and pace of delivery. Version control is straightforward in…
-

Account Security and Recovery
|
Read more: Account Security and RecoveryMost security guidance focuses on protecting accounts from being accessed by others. Less attention is placed upon what happens when you lose access yourself or when an attacker uses your own account recovery process against you. Account lockout is a more common experience than many people expect, and the recovery process, when not set up…
-

Working Securely When Travelling
|
Read more: Working Securely When TravellingTravel introduces a specific set of security risks that don’t exist, or exist in a more controlled form, in a normal working environment. You’re operating on unfamiliar networks, in public spaces, with devices that may be subject to inspection at borders, in locations where the people around you are unknown. The controls that protect you…
-

Why Backups Matter
|
Read more: Why Backups MatterBackups are one of the most consistently undervalued aspects of everyday security. Most people understand in principle that they should back their data up. Far fewer do so reliably, and fewer still have ever tested whether their backup actually works. The practical reality of not having a working backup becomes clear very quickly when something…
-

Collaboration challenges on MOD construction projects
|
Read more: Collaboration challenges on MOD construction projectsOn MOD construction projects, collaboration is constant. Drawings, RFIs, revisions, and mark-ups move between principal contractors, subcontractors, and specialist trades throughout the lifecycle of a programme. Decisions made in one part of the supply chain affect others. Coordination isn’t a phase of the project – it’s continuous. In theory, the process is structured. In practice,…
-

Phishing and Social Engineering
|
Read more: Phishing and Social EngineeringMost successful attacks don’t begin with sophisticated technical exploits. They begin with a message (an email, a text, a phone call), designed to make someone do something they wouldn’t otherwise do. Phishing and social engineering remain among the most effective methods available to attackers precisely because they target human judgement rather than technical defences. The…
-

Secure Authentication: Passwords, MFA and Passkeys
|
Read more: Secure Authentication: Passwords, MFA and PasskeysPasswords are still one of the most common ways systems are accessed, and one of the most common ways they’re compromised. Increasingly, they are also no longer the preferred option where stronger alternatives are available. Guidance from the National Cyber Security Centre and National Institute of Standards and Technology has shifted accordingly. Passkeys are now…
-

CYBERUK 2026 – what’s worth paying attention to
|
Read more: CYBERUK 2026 – what’s worth paying attention toEach year, CYBERUK sets the tone for how cyber security is expected to operate in practice – not just in policy terms, but in what organisations are actually held accountable for. This year’s theme, “The next decade: accelerating our cyber defence”, signals something that’s been building for a while. The conversation has moved on. The…
-

Security is a Product Decision: Why Secure by Design Starts with the Product Owner
|
Read more: Security is a Product Decision: Why Secure by Design Starts with the Product OwnerBy Beth Hurford, Senior Optimisation and Transformation Consultant, Logiq Picture this. You’re in a requirements workshop. There’s a business analyst (BA), a developer, maybe a systems engineer, and you, the product owner (PO). Security isn’t there. Someone decided it was “too early”, that involving them now would mean “too many cooks” and that security can…
-

Logiq acquires Savient Ltd to strengthen capability and expand presence in the South-West
|
Read more: Logiq acquires Savient Ltd to strengthen capability and expand presence in the South-WestBristol, UK – 01 April 2026 – Logiq, a fast-growing, NCSC-assured UK cyber security consultancy and secure solutions provider, has acquired Savient Ltd, a technology and data specialist focused on delivery in highly regulated environments, strengthening its capability and further expanding its presence in the South-West. Founded in 2018, Logiq has grown rapidly to a…
