⭐100K+ Monthly Downloads

⭐Top 20 Apple Management

⭐100K+ Monthly Downloads ⭐Top 20 Apple Management

The Small Business Cybersecurity Guy pointing directly at the camera with a serious expression.

The Small

Business

Cyber Security Guy


Welcome to the blog and podcast, where we share brutally honest views, sharp opinions, and lived experience from four decades in the technology trenches. Whether you're here to read or tune in, expect no corporate fluff and no pulled punches.

Everything here is personal. These are my and the team’s thoughts, opinions forged in the heat of battle! And not those of our employers, clients, or any other professional with whom we are associated.

If you’re offended, take it up with us, not them.

What you’ll get here (and on the podcast):

  • Straight-talking advice for small businesses that want to stay secure

  • Honest takes on cybersecurity trends, IT malpractice, and vendor nonsense

  • The occasional rant — and yes, the occasional expletive

  • War stories from the frontlines (names changed to protect the spectacularly guilty)

I've been doing this for over 40 years. I’ve seen genius, idiocy, and everything in between. Some of it makes headlines, and most of it should.

This blog and the podcast are where we break it all down.

Grab a coffee and pull up a chair, you need to see this!

Stop the Security Industry Bullshit. Wear Your Message.
Threat Intelligence Noel Bradford Threat Intelligence Noel Bradford

Your VPN Is a Nation-State Doorway: What Google's Defence Report Means for Every UK Business

Google just dropped a report that should make every UK business owner physically uncomfortable. Chinese state-sponsored hackers have exploited more than two dozen zero-day vulnerabilities in VPNs, routers, and firewalls since 2020. From ten different vendors. The average time they sit inside your network before anyone notices? 393 days. Over a year of unfettered access.

And if you think "I'm not a defence contractor, this doesn't affect me," think again. Manufacturing has been the single most targeted sector on ransomware leak sites since 2020. Your edge devices aren't protecting you. They're welcoming nation-states straight through the front door.

Read More
Threat Intelligence Noel Bradford Threat Intelligence Noel Bradford

When Sandworm Tried to Kill the Lights in Poland: Why the NCSC Is Warning UK Businesses Right Now

Russia's Sandworm hacking group just attempted the largest cyber attack on Poland's energy infrastructure in years, deploying custom wiper malware called DynoWiper against 30 wind farms, solar installations, and a heat plant serving half a million people. The attack failed, but only barely. The NCSC is now warning UK critical infrastructure operators to act immediately. If you think nation-state attacks on power grids are somebody else's problem, think again. Every UK business sitting in those supply chains just became a potential stepping stone for the next Sandworm operation.

Read More
Threat Intelligence, Podcast Noel Bradford Threat Intelligence, Podcast Noel Bradford

Four Campaigns, One Week, Zero Excuses: New Episode Out Now

Four concurrent cyberattack campaigns hit last week. Russian military intelligence weaponised a critical Microsoft Office vulnerability within 24 hours of the patch dropping. Commodity criminals started selling the same capability for £50 a month. A Chinese-linked group compromised Notepad++ updates for six months. Three separate macOS infostealer campaigns ran simultaneously. And while all of that was unfolding, the UK's biggest data protection law change since Brexit went live with 48 hours' notice. Cookie fines jumped from £500,000 to £17.5 million overnight. We broke all of it down in this week's episode.

Read More
Podcast, Threat Intelligence Mauven MacLeod Podcast, Threat Intelligence Mauven MacLeod

Four Game-Changing Cyber Stories in One Episode

The acting head of America's cybersecurity agency just uploaded government secrets to ChatGPT. Meanwhile, a Dublin IT manager discovered £18,000 worth of unused incident response services sitting in his cyber insurance policy. Passkeys can eliminate phishing attacks completely. And those viral Trump cloud cartoons? They're exposing the infrastructure dependency crisis threatening UK businesses. Four critical cybersecurity stories. Three expert guests. 45 minutes that could transform how your business approaches security. This isn't your typical cybersecurity podcast. Listen now.

Read More
Compliance & Risk Management Mauven MacLeod Compliance & Risk Management Mauven MacLeod

US Cloud Sovereignty Isn't a Trump Problem, It's a Three-Company Problem: Why UK SMBs Need to Understand Infrastructure Dependency

You've seen the memes. Trump is controlling cloud providers like puppets. Trump is literally unplugging Europe from US infrastructure.

They're viral because they touch a nerve about something real: UK businesses run on American infrastructure controlled by American laws. But the political framing misses the actual problem.

This isn't about any particular president or administration. This is about 15 years of infrastructure consolidation, creating structural dependency that predates and will outlast any political cycle.

Let's dissect what those images actually represent, why they're simultaneously right and wrong, and what UK SMBs need to understand about where their data actually lives.

Read More
Compliance & Risk Management, Guest Blog Corrine Jefferson Compliance & Risk Management, Guest Blog Corrine Jefferson

When the Cybersecurity Guardian Uploads State Secrets to OpenAI: The CISA ChatGPT Incident

The reality is this: the acting director of America's civilian cybersecurity agency uploaded sensitive government contracting documents to ChatGPT's public platform. Multiple automated alerts were triggered.

A Department of Homeland Security investigation was launched. And somehow, this still happened. From my former life in government service, I can tell you this isn't just embarrassing.

It's a systems failure that reveals fundamental problems with how we approach privileged access, AI governance, and the dangerous assumption that senior officials understand operational security better than the controls designed to protect them.

Read More
Technology Risk Kathryn Renaud Technology Risk Kathryn Renaud

When Your Firewall Vendor Starts Dropping Weekly CVEs

Your firewall vendor just announced another critical vulnerability. Last week brought two more. Last month? Six. When does "routine security update" become a vendor reliability crisis that threatens your business?

For UK SMBs running Fortinet or SonicWall, the CISA Known Exploited Vulnerabilities catalogue tells an uncomfortable story: your perimeter security is under active, documented attack. This isn't vendor marketing or compliance theatre.

This is your board-level "do we stay or do we leave" conversation, backed by evidence, decision frameworks, and a migration playbook that won't destroy your operations. Time to score your vendor.

Read More
Noel Bradford Noel Bradford

Your Factory Floor Is A Risk at Industrial Scale: When the £5 Million CNC Machine Has the Same Problem as Your Office Printer

OT (operational technology) security protects industrial control systems, SCADA, and production equipment from cyberattacks. Unlike office IT security, OT security focuses on systems that control physical processes - CNC machines, production lines, and factory automation. A 2025 UK government study found 90% of OT attacks originate from IT network vulnerabilities, with downtime costing manufacturers £195,000 to £2.2 million per hour.

Read More
Industry Analysis Mauven MacLeod Industry Analysis Mauven MacLeod

Fortinet's Security Crisis: Why Does Nobody Care That Your VPN Is a Nation-State Playground?

Here's a question that should keep every director awake: what happens when the device meant to protect your network becomes the primary way attackers get in?

Between 2023 and now, Fortinet's SSL VPN has been exploited three separate times using the same type of vulnerability. Chinese intelligence services stole configurations from 20,000 organizations worldwide.

Cyber insurers charge double the premiums for businesses using Fortinet kit. Yet Fortinet posted 50% revenue growth and continues to dominate the enterprise firewall market.

This isn't a technical problem. It's a market failure that puts your business at risk while nobody gives a damn.

Read More
Compliance & Risk Management Seamus O'Leary Compliance & Risk Management Seamus O'Leary

My Cyber Insurance Wake-Up Call: Why Your Insurer Should Be Your First IR Phone Call

Right, so I'll be honest. Six months ago, I thought cyber insurance was just another checkbox on the compliance list. Pay the premium, tick the box, hope you never need it. Then Noel challenged me to actually read my policy and treat my insurer as an incident response partner. What I found changed everything. Turns out my €10,200 annual premium wasn't buying risk transfer. It was buying a specialist IR team, forensics support, tabletop exercises, and gap assessments I'd been trying to budget for separately. Here's what I learned implementing this approach at our 100-person Dublin firm.

Read More
Threat Intelligence Corrine Jefferson Threat Intelligence Corrine Jefferson

The Slopocalypse in the Apple App Store: When Five-Star Apps Leak Your Life

The Apple App Store feels safe. That is the story many people tell themselves. Firehound and Vulnu show why that comfort can be dangerous. Researchers have flagged this week insecure iPhone apps that expose user data through badly secured cloud storage. Some leak private chats, email addresses, and location traces. Many of these apps look polished and carry strong ratings. That is the trap. In this guest post, Corrine Jefferson explains how slop apps slip through review, why AI apps raise the stakes, and what you can do today to cut your risk. What is on your phone right now?

Read More
Technical Analysis, Patch Tuesday, Podcast Graham Falkner Technical Analysis, Patch Tuesday, Podcast Graham Falkner

January 2026 Patch Tuesday: New Year, New Nightmares for SMB Security

Microsoft’s January 2026 Patch Tuesday delivered 114 updates and 3 zero-days – with SharePoint Toolshell, Fortinet VPN bypass, and HPE OneView RCE leading the charge. This isn’t theoretical. Attackers are already exploiting these in the wild. From Adobe Acrobat to Apple’s WebKit spyware holes, no vendor was spared. SMB IT teams, you’re on the clock. Here’s your no-fluff, brutally honest patching guide.

Read More
News Desk News Desk

Monday's Cyber Carnage: Instagram Chaos, Nissan Breach, and Why Tomorrow's Patch Tuesday Can't Come Soon Enough

Monday, 12th January 2026. Instagram denies a breach while millions get password reset emails. Nissan admits attackers stole employee data. A UK school in Nuneaton faces "serious" cyber attack. Three London councils still recovering from November breach affecting 100,000 households. India's entire mobile security infrastructure looks dodgy as hell. BreachForums, the criminal marketplace itself, gets its database leaked. And the US withdraws from global cyber coordination bodies right when we need cooperation most. Eight incidents. One common thread: credentials, governance failures, and shared infrastructure vulnerabilities. Tomorrow is Patch Tuesday, but you can't patch stupid.

Read More
Compliance & Risk Management Noel Bradford Compliance & Risk Management Noel Bradford

When Security Policies Accidentally Exclude: A Lesson for Charities Pursuing Cyber Essentials

I watched a board meeting where someone was asked to turn off their hearing aid during a security discussion. Bluetooth concerns, apparently.

The company meant well, but they'd created a policy that would exclude anyone using assistive technology.

I've seen this same pattern emerge in charity governance—organisations pursuing Cyber Essentials creating barriers for disabled trustees and staff.

This isn't about security frameworks being flawed. It's about implementation requiring thought beyond checklists. Here's how charities can build security AND inclusion together, not force people to choose between them.

Read More
Technology Risks, Podcast Noel Bradford Technology Risks, Podcast Noel Bradford

Passkeys Implementation for UK SMBs: The Complete Technical Guide to Deploying Phishing-Resistant Authentication in 2026

You've read the threat intelligence. You understand AITM attacks. Now you need to actually deploy passkeys without breaking everything. This is the technical guide your IT person needs: Microsoft 365 integration steps, device compatibility requirements, troubleshooting the inevitable issues, and realistic timelines for businesses that can't afford downtime during authentication migration.

Read More
Threat Intelligence, Podcast Noel Bradford Threat Intelligence, Podcast Noel Bradford

Your MFA Is Being Bypassed Right Now: The 146% Surge in Attacks Nobody's Talking About

You've got MFA turned on. Authenticator app, text codes, the lot. You think you're protected. Now picture this: your finance director clicks a legitimate-looking link, signs in, approves the MFA request like always, and boom—an attacker just stole her session token. Full access to Microsoft 365. No more MFA prompts needed. Welcome to 2026, where adversary-in-the-middle attacks surged 146% in the past year. Nearly 40,000 incidents daily. Your traditional MFA? Doing precisely nothing to stop them. Time to talk about phishing-resistant authentication before your competitor gets breached instead of you.

Read More
Vendor Risk Management Noel Bradford Vendor Risk Management Noel Bradford

Your Photo Booth Uploaded Every Picture to the Internet: The Hama Film Security Theatre

Remember that fun photo booth snap at your mate’s wedding? The one where you’re pulling faces with the bridesmaids? It’s been sitting on an unprotected server for the past three weeks, accessible to anyone who could count to 1,000. Hama Film, an Australian photo booth company with operations in the UAE and United States, spent months exposing customer photos through a security flaw so basic it makes WannaCry look sophisticated. No authentication. No rate-limiting. Just pure, unfiltered incompetence serving up private moments to anyone curious enough to look. And they’re still not fixing it properly.

Read More

⚠️ Full Disclaimer

This is my personal blog. The views, opinions, and content shared here are mine and mine alone. They do not reflect or represent the views, beliefs, or policies of:

  • My employer

  • Any current or past clients, suppliers, or partners

  • Any other organisation I’m affiliated with in any capacity

Nothing here should be taken as formal advice — legal, technical, financial, or otherwise. If you’re making decisions for your business, always seek professional advice tailored to your situation.

Where I mention products, services, or companies, that’s based purely on my own experience and opinions — I’m not being paid to promote anything. If that ever changes, I’ll make it clear.

In short: This is my personal space to share my personal views. No one else is responsible for what’s written here — so if you have a problem with something, take it up with me, not my employer.