<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber News - Stay Up To Date On The Latest With Experts At CCS</title>
	<atom:link href="https://complete-cyber-security.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Secure your World</description>
	<lastBuildDate>Mon, 24 Dec 2018 10:48:24 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://complete-cyber-security.com/wp-content/uploads/2020/11/cropped-Fresh-Mango-Logo-Transparent-White-1024x338-2-32x32.png</url>
	<title>Cyber News - Stay Up To Date On The Latest With Experts At CCS</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How To Deal With Cyber Breaches From A Brand Perspective</title>
		<link>https://complete-cyber-security.com/cyber-breaches-vlog/</link>
					<comments>https://complete-cyber-security.com/cyber-breaches-vlog/#respond</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 09:01:49 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<guid isPermaLink="false">http://ccs-cyber-security.co.uk/?p=251</guid>

					<description><![CDATA[<p>Check out my latest vlog from me, Guy Phoenix, and learn how to deal with cyber breaches from a Brand perspective, a skill you may never realize the importance of until it's too late.</p>
<p>The post <a href="https://complete-cyber-security.com/cyber-breaches-vlog/">How To Deal With Cyber Breaches From A Brand Perspective</a> appeared first on <a href="https://complete-cyber-security.com">Complete Cyber Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div><div class="wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<h2 style="text-align: center;"><strong>My recent video log (The impact on a Brand of a <a href="https://complete-cyber-security.com/">cybersecurity</a> breach)</strong></h2>
<p style="text-align: center;">Check out my latest vlog from me, Guy Phoenix, and learn about &#8216;dealing with cyber breaches from a Brand perspective&#8217;, a skill you may never realise the importance of until it&#8217;s too late.</p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-251-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://ccs2000.co.uk/wp-content/uploads/2018/10/VID_20181012_134341-converted-with-Clipchamp.mp4?_=1" /><a href="https://ccs2000.co.uk/wp-content/uploads/2018/10/VID_20181012_134341-converted-with-Clipchamp.mp4">https://ccs2000.co.uk/wp-content/uploads/2018/10/VID_20181012_134341-converted-with-Clipchamp.mp4</a></video></div>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div><p>The post <a href="https://complete-cyber-security.com/cyber-breaches-vlog/">How To Deal With Cyber Breaches From A Brand Perspective</a> appeared first on <a href="https://complete-cyber-security.com">Complete Cyber Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://complete-cyber-security.com/cyber-breaches-vlog/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://ccs2000.co.uk/wp-content/uploads/2018/10/VID_20181012_134341-converted-with-Clipchamp.mp4" length="97899691" type="video/mp4" />

			</item>
		<item>
		<title>The Impact On A Brand Of A Cybersecurity Breach</title>
		<link>https://complete-cyber-security.com/cyber-breach-transcript/</link>
					<comments>https://complete-cyber-security.com/cyber-breach-transcript/#respond</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 09:01:28 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<guid isPermaLink="false">http://ccs-cyber-security.co.uk/?p=249</guid>

					<description><![CDATA[<p>This is the Transcript of my recent video log (The impact on a Brand of a cybersecurity breach) – my voice is difficult to hear since I was asked to keep it down by the BA Cabin staff for disturbing other passengers. {Sorry!}</p>
<p>The post <a href="https://complete-cyber-security.com/cyber-breach-transcript/">The Impact On A Brand Of A Cybersecurity Breach</a> appeared first on <a href="https://complete-cyber-security.com">Complete Cyber Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div><div class="wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<h2 class="new_bold" style="text-align: center;">This is the Transcript of my recent video log (The impact on a Brand of a <a href="https://complete-cyber-security.com/">cybersecurity</a> breach)</h2>
<p style="text-align: center;">My voice is difficult to hea, since I was asked to keep it down by the BA Cabin staff for disturbing other passengers. {Sorry!}</p>
<p style="text-align: center;">I’m actually making this Vlog on board a British Airways flight from London to Austin in the United States, where I’m looking forward to a much needed holiday, taking in the Austin City Limits Music Festival and the Formula 1 Grand Prix – GO LEWIS!</p>
<p style="text-align: center;">I’ve been incredibly fortunate to be upgraded to First Class by BA, and I’m going to make a separate Vlog for my marketing business to highlight what it’s like. In this Vlog I’m actually focusing on cyber security.</p>
<p style="text-align: center;">A couple of weeks ago I was invited to present at the Brand Yorkshire conference in Harrogate in the UK. The topic was the impact on a Brand of a cybersecurity breach. I highlighted a few companies to exemplify best and worst practice, and one of the companies I talked about was BA, since they were victims of a cyber breach this Summer. I thought I would take the opportunity on board a long BA flight to reiterate what happened to BA and what they did about it.</p>
<p style="text-align: center;">What happened?: For more than two weeks this summer (August 21 to September 5), hackers were inside the systems of British Airways.</p>
<p style="text-align: center;">They took the personal and financial details of customers who made, or changed, bookings on ba.com or its app during that time.</p>
<p style="text-align: center;">Names, email addresses and credit card information were stolen – including card numbers, expiration dates and the three digit CVC code required to authorise payments.</p>
<p style="text-align: center;">Around 380,000 transactions were affected. BA blamed a &#8220;sophisticated&#8221; group of cyber criminals but didn&#8217;t give any more details. A post on its website says people should contact their banks, people will be reimbursed and it will pay for a credit checking service.</p>
<p style="text-align: center;">In summary, BA gave Full disclosure. Recommendations on their website. Contacted the customers.</p>
<p style="text-align: center;">Now I asked the conference where I presented, what could BA have done better about this cybersecurity breach? Well, it was a bit of a trick question, because I actually think BA did an excellent job – and I’m not saying that because they just upgraded me! They got out in front of it, were open and transparent, contacted their customers and told them what to do, and assured them that they would cover any costs. The additional credit check service was a nice touch too.</p>
<p style="text-align: center;">The conclusion of my talk highlighted how businesses can prepare for something like this. The first aspect of course is prevention – stop the cybersecurity breach from happening. The BA breach was sophisticated, nonetheless there are means of ensuring your website is protected and monitored. Similarly there are methods for protecting IT systems in general, notably:</p>
<ul style="text-align: center;">
<li><a href="https://complete-cyber-security.com/cyber-security-services/cyber-hygiene/" target="_blank" rel="noopener">Cyber Hygiene Training</a> for all staff – 80% of successful attacks are a result of poor cyber hygiene training</li>
<li><a href="https://complete-cyber-security.com/cyber-security-services/cyber-monitoring/" target="_blank" rel="noopener">Software Measures</a> – know when you’re under attack. Continuous Performance Monitoring can alert you to potential attacks and breaches – externally and internally</li>
<li>Vulnerability and Cyber Assessment <a href="https://complete-cyber-security.com/cyber-security-services/cyber-security-vulnerability-assessments/" target="_blank" rel="noopener">Audits</a> – getting a third party to conduct a thorough and holistic review of your cyber security is the best way to get started on the road to a robust and secure business.</li>
</ul>
<p style="text-align: center;">It won’t surprise you to hear that my IT companies &#8211; Fresh Mango Technologies (based in the Caribbean) and CCS (based in the UK) provide these services to clients. It’s also worth me pointing out that they aren’t hugely expensive. We have a starter package for SMEs which costs just £195 or $295 a month. When you consider the cost of a breach – frankly it can be an existential threat to most SME’s – it’s well worth the investment.</p>
<p style="text-align: center;">Finally, from prevention we go to the post-breach action plan. You need a crisis management plan in place. There are plenty of recommended PR plans available online, my favourite is the Adweek plan, because it’s straightforward:</p>
<ul style="text-align: center;">
<li>Get your plans in order</li>
<li>Triage the problem</li>
<li>Respond quickly on social</li>
<li>Be honest, transparent and direct</li>
</ul>
<p style="text-align: center;">I don’t think you’ll be too surprised to hear that my marketing agency can assist with this as well!</p>
<p style="text-align: center;">Anyway, I think it’s clear that British Airways had a robust crisis management plan &amp; recovery options in place, and their execution of the same was very good indeed. We had a show of hands at the conference, asking the question who would book on BA.com again. There was an overwhelming majority saying they would without hesitation. Clearly a job well done!</p>
<p style="text-align: center;">OK, that’s the end of this Vlog, hope you enjoyed it and if you’d like to find out more about how my businesses can help your business, please get in touch. Just drop a message on the social media channel or blog where you saw this video and we’ll get back to you.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div><p>The post <a href="https://complete-cyber-security.com/cyber-breach-transcript/">The Impact On A Brand Of A Cybersecurity Breach</a> appeared first on <a href="https://complete-cyber-security.com">Complete Cyber Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://complete-cyber-security.com/cyber-breach-transcript/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The British Airways Security Breach</title>
		<link>https://complete-cyber-security.com/british-airways-security-breach/</link>
					<comments>https://complete-cyber-security.com/british-airways-security-breach/#respond</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 09:00:55 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<guid isPermaLink="false">http://ccs-cyber-security.co.uk/?p=247</guid>

					<description><![CDATA[<p>We're understandably receiving many queries and concerns relating to the recent British Airways security breach. We thought it best to provide some basic advice in case you, your family or your team members are at risk from this breach.</p>
<p>The post <a href="https://complete-cyber-security.com/british-airways-security-breach/">The British Airways Security Breach</a> appeared first on <a href="https://complete-cyber-security.com">Complete Cyber Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div><div class="wpb_column vc_column_container vc_col-sm-8"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p style="text-align: center;">We&#8217;re understandably receiving queries and concerns relating to the British Airways security breach. We thought it would be helpful to provide some basic advice in case you, your family or your staff are at risk from this breach.</p>
<ol style="text-align: center;">
<li>
<div>If your BA account password is one you use elsewhere, change it on all the accounts where you use it. As a general rule, password re-use is not recommended.</div>
</li>
<li>
<div>Attackers may use your personal details to target you with emails, texts and calls. As always, be suspicious of unsolicited requests for your personal or financial details.</div>
</li>
<li>
<div>
<div> If your financial data was compromised, be vigilant on your bank accounts. If you notice any unauthorised transactions, notify your bank or card company.</div>
</div>
</li>
<li>
<div>If you have credit card information stored in your account on BA, cancel the card and request a new one from your bank.</div>
</li>
</ol>
<p style="text-align: center;">You can report any suspicious activity or fraud to ActionFraud online at <a id="LPlnk6969" class="OWAAutoLink" href="https://www.actionfraud.police.uk/">https://www.actionfraud.police.uk/</a></p>
<div style="text-align: center;"></div>
<div style="text-align: center;">Please <a href="https://ccs2000.co.uk/contact/">contact CCS</a> if you have any further queries or require cyber assistance.</div>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"></div></div></div></div>
</div><p>The post <a href="https://complete-cyber-security.com/british-airways-security-breach/">The British Airways Security Breach</a> appeared first on <a href="https://complete-cyber-security.com">Complete Cyber Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://complete-cyber-security.com/british-airways-security-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching 12/137 queries in 0.035 seconds using Disk

Served from: complete-cyber-security.com @ 2026-04-17 16:12:43 by W3 Total Cache
-->