<img src="https://www.visionary-agile24.com/801599.png" style="display:none;">
Industry Insights

Welcome to Conosco’s Industry Insights, your go-to source for the latest trends, breakthroughs, and expert opinions in the IT sector.

Our blog delves into the dynamic world of technology, offering in-depth analyses, practical advice, and forward-thinking perspectives. Whether you’re an IT professional, business leader, or tech enthusiast, stay ahead of the curve with our comprehensive coverage of the industry’s most pressing topics. 

Deepfakes, voice clones, and AI-written lures

Deepfakes, voice clones, and AI-written lures

European Cybersecurity Month highlights social engineering for good reason. Attacks now target people more than code. Even a cloned voice or a routine approval process can lead to failures, despite having good controls in place. These issues can be avoided only if leadership recognises social engine …

Oct 17, 2025 6 min read
Your supply chain just got stronger
Cyber Essentials Blog.

Your supply chain just got stronger

Cyber Essentials Renewed Conosco has renewed Cyber Essentials Plus for another year, with the new certificate issued this October. The assessment confirms that core controls are in place, operating correctly, and applied to real devices across the environment that underpins client services. That inc …

Oct 16, 2025 2 min read
How social engineering actually breaks a business

How social engineering actually breaks a business

European Cybersecurity Month highlights social engineering for good reason. Attacks now target people more than code. Even a cloned voice or a routine approval process can lead to failures, despite having good controls in place. These issues can be avoided only if leadership recognises social engine …

Oct 14, 2025 5 min read
Windows 10 end of support: what actually happens on 14 October 2025
windows11lwaves

Windows 10 end of support: what actually happens on 14 October 2025

Windows 10 support ends on Tuesday, 14 October 2025. That switch does not power off devices; it changes the risk. Security updates for Windows 10 stop, which means exploits widen, and insurers, auditors, and procurement officers will ask more complex questions. Microsoft is clear about what ends, an …

Oct 13, 2025 5 min read
Penetration testing for first-timers: how to know if you need one
penetrationtest

Penetration testing for first-timers: how to know if you need one

Most first Penetration Testing projects are bought for the wrong reason. A client asks for a certificate, cyber insurance tightens its wording, or a board member reads about an incident and wants reassurance by quarter-end. Penetration Testing is most effective when it is risk-driven and well-scoped …

Oct 10, 2025 6 min read
Long read: what the BBC got right, and where leaders must push further
Piggy bank on jenga

Long read: what the BBC got right, and where leaders must push further

This long-form analysis responds to the BBC’s investigation, “The true cost of cyber attacks – and the business weak spots that allow them to happen,” examining the incidents that halted Jaguar Land Rover, disrupted Marks & Spencer and Co-op, and exposed the fragility of the UK’s critical supply …

Oct 8, 2025 9 min read
When one portfolio company gets hacked, you all pay.
High Rise Buildings

When one portfolio company gets hacked, you all pay.

Portfolio companies don’t face a single cyber risk. They face a networked risk. A compromise at one portfolio company often exposes shared vendors, credentials, and processes that repeat across the rest of the fund. That’s aggregation. It’s why ransomware and supply-chain attacks scale so efficientl …

Oct 6, 2025 3 min read
In-house security vs outsourced: who wins on ROI, and productivity
People piecing a jigsaw together

In-house security vs outsourced: who wins on ROI, and productivity

Security can be a powerful catalyst for productivity, not a burden to bear. The right operating model frees engineers to build, removes friction from change, and shortens recovery when something goes wrong. For most UK organisations outside the very largest enterprises, managed security delivers fas …

Aug 15, 2025 5 min read
Conosco joins Mimecast's Security Researcher Wall of Fame

Conosco joins Mimecast's Security Researcher Wall of Fame

Conosco has been added to Mimecast's Security Researcher Wall of Fame, recognising responsible disclosure efforts led by Martin Hodgson, Consultant at Conosco. The accolade reflects disciplined security work carried out within a broader programme to strengthen email authentication across suppliers a …

Aug 13, 2025 4 min read
Security tools ≠ security strategy
Scales with balls

Security tools ≠ security strategy

Security investments are rising. So are breaches Across the industry, there is a widening disconnect between spend and security outcomes. New platforms are deployed, contracts are signed, and dashboards are configured. But threats keep evolving, incidents keep happening, and organisations are often …

Aug 5, 2025 4 min read
We made 9 cybersecurity predictions for 2025 - how are we doing?
Score scaled with very good

We made 9 cybersecurity predictions for 2025 - how are we doing?

Back in January, we sketched nine forces we said would shape cybersecurity through 2025. Seven months of field data are in. Some calls landed almost on the nose, others misfired, and a few are still warming up. Below is the expanded scorecard on how our predictions are stacking up. For details on ho …

Jul 29, 2025 6 min read
Switching MSPs: What you need to know
Image of crossroads going in different directions

Switching MSPs: What you need to know

Changing Managed Service Providers (MSPs) represents a pivotal decision for mid-sized enterprises in the UK. This choice often stems from a desire for improved IT support, enhanced cybersecurity measures, cost efficiency, or better alignment with business goals and technology strategies. The transit …

Jul 15, 2025 2 min read