Blog
Hallo Amsterdam!
We’re excited to share that ITogether has expanded into mainland Europe with a new office in Amsterdam. This marks an important step forward in our mission to support clients with secure, scalable network and cybersecurity solutions – wherever they operate. As demand...
Lunch & Learn Webinar: Patching That Works
10 June 2025 | 13h00 - 14h00 BST in collaboration with Yorkshire Cyber Security Cluster and Action 1 👉 Register Here Keeping your endpoints patched can be a nightmare. Enter Action1, the autonomous endpoint management platform that patches OS and third-party software...
Strengthening your Human Firewall: The Critical Role of Security Awareness in Preventing Cyber Threats
In the UK’s recent retail cybersecurity attack, “M&S hackers tricked IT help desk workers to access company systems… which saw [Marks & Spencer] lose £650m of value in a matter of days.[1] When we think about cybersecurity, our minds often jump straight to...
What Can ITogether Do For You?
Many of our customers come to us for a specific service, whether that’s managed network or cybersecurity support, but what often surprises them is just how wide our expertise runs. From cloud connectivity solutions for hybrid workforces to round-the-clock threat...
AI’s Double-Edged Sword: How Cybercriminals are Exploiting Artificial Intelligence to Perfect Social Engineering
In February 2024, a finance employee at the multinational firm Arup received an urgent video call from the company’s Chief Financial Officer (CFO). The CFO, appearing on screen with familiar voice and mannerisms, instructed the transfer of $25 million to a new...
ITogether & WCBCS: Supporting the Local IT Community
Here at ITogether, we believe in fostering collaboration and professional growth in the IT community. That’s why we’re excited to be working with the West Yorkshire BCS Branch (WYBCS), a volunteer-led group that runs free events for IT professionals in the region....
Avoidable Failures: What Bybit & Phemex Teach Us About Security
In the spring of 2024, a breach at the cryptocurrency exchange Bybit made headlines—not because it was particularly advanced, but because it could have been avoided. The attackers exploited a software vulnerability that had been flagged months earlier but never fixed....
The Ransomware Racket Has Changed
For years, ransomware attacks followed a predictable pattern: hackers would break in, encrypt sensitive business data, and demand payment for the decryption key. Businesses had two options—restore from secure backups or pay up. But now, cybercriminals have realised...
The First Ransomware Attack: A Floppy Disk’s Legacy
In December 1989, thousands of individuals received an unexpected package: a floppy disk labelled "AIDS Information Introductory Diskette." This seemingly benign disk would later be recognised as the vehicle for the world’s first ransomware attack, marking the dawn of...
WEBINAR – API Security: Risk & Defence
APIs (Application Programming Interfaces) are the digital glue holding organisations together. They enable software and systems to communicate, automate workflows, and enhance user experiences. But as their use grows, so does the risk of API security breaches....
Recorded Future’s Threat Analysis Report
The latest cyber Threat Analysis Report from Recorded Future’s Insikt Group provides a deep dive into the most significant cyber threats of 2024 and outlines key predictions for 2025. As cybercriminals adapted to law enforcement crackdowns, businesses struggled with...
When Ransomware Hits Close to Home
Blacon High School in Chester, UK, recently became the latest victim of a ransomware attack... Hackers infiltrated their systems, locked critical files, and brought the school to a standstill. Students were sent home, teachers scrambled to adapt lessons to remote...
Cybersecurity in New Zealand and the UK
Cybersecurity in New Zealand and the UK: A Shared Responsibility It was a typical Monday morning when James*, a small-business owner in Christchurch, opened his email and froze. The subject line read: “Your system has been compromised.” The sender demanded...
Why Vendor Vulnerability Data Matters in Cybersecurity
As cyber threats grow more sophisticated, the ability of organisations to defend themselves depends heavily on their vendors’ speed and efficiency in addressing known, published vulnerabilities. Often referred to as CVE’s. One key aspect that often gets...
Don’t miss our Cybersecurity Land Rover Experience Events
Book Here Mark your calendars for 26 March and 15 May as we take you on the muddiest cybersecurity events in Yorkshire! What to Expect Our Land Rover Experience cybersecurity events provide an extraordinary setting to gain valuable insights and create...
The Rise of API Threats: Insights from Akamai’s State of the Internet Report
This year's Akamai’s State of the Internet Report shines a light on API vulnerabilities and their exploitation, offering actionable insights for organisations. We've summarised key findings for you here... Chapter 1: Growing API Attacks APIs have become a crucial part...
Proactive API Security & DDoS Protection with ITogether Professional Services
Keeping your websites, applications, APIs, and users safe demands deep expertise and world-leading tech. Here at ITogether, we integrate proactive monitoring, fast incident response, regular tuning, and dedicated security specialists into a single, comprehensive...
Ransomware in 2025: The Evolution of a Cyber Pandemic
The year is 2025. Encryption, once the cornerstone of online security and privacy, has become the ultimate tool of exploitation. Cybercriminals have honed their craft, transforming ransomware from a blunt weapon into a scalpel of precision. What was once an...