Blog
News and information from the Advent IM team.
Cybersecurity is now on the agenda for almost every UK school, with 95-98% of schools that took part in the ‘Cyber security breaches survey 2025: education institutions findings’ understand that cybersecurity is discussed at board or governor level. However, in this same report, there’s suggestions that awareness and preparedness don’t always keep up with the […]
Read MoreWho is Dexter? Dexter Morgan is a fictional blood-spatter analyst for Miami Metro who moonlights as a vigilante killer. He follows a strict set of rules, “the Code,” to target only proven murderers and to avoid getting caught. Morally thorny, yes, but the interesting bit for us is the discipline. He survives by sticking to […]
Read MoreThe recent massive data breach has once again posed a risk to the security integrity of online security systems. Read Here.
Read MoreData centres are only as resilient as the ecosystem that supports them. Behind the racks and cooling systems sits a long supply chain: managed service providers, contractors, software vendors, facilities engineers, and sub-contractors. Each one is a potential weak point. For customers, the question is simple: how do I know my provider’s suppliers are not […]
Read More**PRESS RELEASE** Facial Recognition in the Spotlight: Advent IM Responds with New Compliance Review Advent IM Unveils Facial Recognition Technology Audit Compliance Review Service to Support Police and Wider Public and Private Sector Organisations in Meeting Data Protection Standards. Media Contact: Olivia Lawlor Blackburn +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 27.10.25 Advent IM, […]
Read MoreCybercrime doesn’t just drain budgets and stall operations. It also quietly erodes confidence, sleep, and trust, especially for the person who clicked, uploaded, or approved something that later became the pivot point for an incident. In security programmes, we often track mean time to detect and mean time to recover. We rarely track the human […]
Read MoreThe Collins Aerospace incident is another reminder that third-party risk is no longer an abstract concept; it is one of the most common ways attackers get inside. In this case, the compromise wasn’t a direct assault on an enterprise perimeter but a ransomware attack that entered via the supply chain. Not only was data disrupted, […]
Read MoreThe UK’s data protection regulator declined to launch an investigation into a leak at the Ministry of Defence that risked the lives of thousands of Afghans connected with the British Armed Forces. Read Here.
Read MoreThe Ministry of Defence (MoD) is investigating claims Russian hackers stole hundreds of sensitive military documents and published them on the dark web. Read Here.
Read MoreData centres are more than racks and power circuits; they are socio-technical hubs where people, plant and policy must all work together. That’s why physical security red teaming — an authorised, realistic simulation of attacks on buildings, personnel and procedures — is one of the most efficient ways to turn security controls into boardroom confidence […]
Read More