Cyber Security Identity Verification: the key to protecting your business from deepfake scams Is the evolving threat of impersonation killing visual trust? The 2025 Phishing by Industry Benchmarking Report reveals a rapid decline in the phishing click rate (globally, an 86% reduction) after 12 months of security training. But while you successfully minimise... Explore Resource
Cloud & Infrastructure The Microsoft 365 productivity tax and how to reclaim it Defining the Microsoft 365 Productivity Tax Over the last few years, businesses have embraced Microsoft 365 (M365) to facilitate remote work, enhance team collaboration and leverage its extensive suite of tools. However, after the initial enthusiasm and investment in new... Explore Resource
Cyber Security The 14-Day Window Just Got Real: Why Patching Is Becoming a Business Risk Over the past week, a series of incidents has made one thing clear: we’ve entered a new phase of vulnerability risk, and organisations aren’t ready for it. From the rapid exploitation of cPanel, to tightening regulatory expectations from Cyber Essentials,... Explore Resource
Cyber Security The Rockstar Breach Wasn’t an Outlier: It Was a Warning Shot Attackers are changing their economics, and for some time now, predictions have been circulating that supply chains would become the dominant attack model for cyber criminals. What we’re seeing now is those predictions materialising, and quickly. The Rockstar Games breach didn’t just make headlines... Read now
Cloud & Infrastructure The Legacy Infrastructure Dilemma Sweating the Assets: The Tipping Point of Technical Insolvency When the pandemic hit, 84% of UK businesses were struggling as they were ‘sweating assets’ in an attempt to save costs and stay afloat. Like many in the world, they considered... Explore Resource
Cyber Security 10 AWS Security Issues & How They Can be Addressed AWS is a leading cloud platform that offers many cloud services. Whilst AWS provides robust security features natively, sometimes enabled by default, misconfiguration can still occur, which can lead to vulnerabilities. In this article, we dive into 10 common AWS... Read now
Cyber Security Security Advisory: MDM Takeover Prevention In March 2026, an Iran-linked threat actor compromised Stryker Corporation’s Microsoft Intune environment and executed a mass remote wipe of over 200,000 managed endpoints across 79 countries. This was not ransomware. There was no data exfiltration demand. The objective was... Download now
Cyber Security Is 2026 the end of the annual pen-test? The Obsolescence of “Point-in-Time” Security Pen testing helps you identify vulnerabilities in your infrastructure and applications before attackers can exploit them and gain access to your systems. But how can you prevent such attacks by relying solely on a pentest... Explore Resource
Gated Content CISO Intel Briefing: Iran Cyber Threat Landscape Our CISO, Darren Humphries, has prepared a Cyber Intel Briefing on the Iran situation, trying to do his part to remove industry Fear, Uncertainty and Doubt (FUD). The situation is fluid and can change, and the views expressed are my... Download now
Cloud & Infrastructure UK Insurance Cloud Resilience & Cost Benchmark 2026 Insights aligned to Microsoft Azure and Microsoft 365 best practices Produced by Acora, a Microsoft Partner supporting UK insurers with secure, resilient cloud infrastructure and managed services. Executive Summary The UK insurance sector stands at a critical juncture in its... Explore Resource
Cyber Security The State of Cyber Security: Inside Stories and Predictions for the Year Ahead As 2026 unfolds, we caught up with our Group CISO, Darren Humphries, and SOC Threat Hunting Lead, Antonia Nisioti, to tap into 2025 trends, disruptive reality checks, and key predictions for the year ahead. Their insights, shaped by hands-on experience... Read now
Cyber Security The Shift to Autonomous SOCs: How Agentic AI Empowers the Human Analyst A New Era for SOC 51 seconds. That’s the fastest cyber attack breakout time recorded. Cyber criminals are increasingly weaponising artificial intelligence (AI) to bypass detection and execute attacks faster than ever, creating a new frontier of cyber security challenges.... Explore Resource
Case Study Digital Leap to a Cloud-First Workforce We are proud to partner with PP Control & Automation, an award‑winning leader in strategic outsourcing solutions and a trusted partner to some of the world’s most successful machinery builders. With operations spanning the UK and global customer reach, PP... Explore Case Study
Global Enterprise Unifying Multi‑Cloud Security A global enterprise with thousands of cloud accounts across AWS, Azure and AliCloud needed a smarter way to manage security. Their mix of cloud‑native tools and legacy commercial platforms was costly, complex, and made unified visibility almost impossible. They turned to Acora... Explore Case Study
Case Study A Secure AWS Foundation for Cloud-First Development Working directly with a consultancy firm that provide health and safety services, they wanted to architecturally review their flagship software system. Designed as easy to use and integral to impacting the way customers view health and safety management and reporting, it was imperative that the system was optimised for the best customer... Explore Case Study
Case Study Securing Merged AWS Environments Post-Acquisition Many organisations experience M&A deals and processes during their time, often requiring the merging of systems, teams and environments to consider. Hydras, an Acora Group company, worked with a start-up EV charging company that had recently been part of a... Explore Case Study
Case Study Baseline to Blueprint: Security as the Cloud Modernisation Catalyst In a sector where durability is non‑negotiable, Global HVAC innovator Nailor Industries recognised the need for a partner who could help them stay ahead of an evolving threat landscape. Nailor’s CIO had previously trusted Secrutiny’s deep security expertise (Now part... Explore Case Study
Internet Watch Foundation A Partnership Dedicated to Securing a Safer Internet We were delighted to work with the Internet Watch Foundation (IWF), a Cambridge-based charity that carries out one of the most vital missions online, removing abusive child content from the internet. With such sensitive work, security isn’t just important, it’s... Explore Case Study
CVS Vets Going Beyond Traditional Penetration Tests and Thinking Like an Attacker Breaking the Mould: A Bold Approach to Cyber Security New in role, the Head of Cyber Security faced an all too familiar dilemma: how to build a strong security strategy that doesn’t rely on assumptions. They needed a true picture... Explore Case Study
Financial Services Long-Term Partnership Powers Competitive Edge in a Dynamic Market At Acora, we have worked with one of our long-term Financial Services customers for many years. As a leading international investment company that backs businesses with capital, expertise and long-term strategic support, the organisation requires continued trust and a deeper... Explore Case Study
Accountancy Rebuilding Trust to Make Technology an Enabler Again Recently, we onboarded the world’s most influential body of professional accountants. With an extensive global footprint and a mission to advance the profession worldwide, they rely heavily on robust, secure, and reliable IT infrastructure to support their members and staff... Explore Case Study
Real Estate Intelligence Visualising Victory: 90 KPIs, One Unified Platform This global leader in real estate intelligence and analytics helps investors identify prime locations for enterprise growth. The business manages vast volumes of property and market data, spread across numerous internal systems, to deliver detailed information packs, advanced lifecycle analytics,... Explore Case Study
Retail Sector Beyond the Perimeter: Clean Pen Tests To Full-Blown Exposure A fast-growing UK-based retailer with 70 years of experience in retail and over a century in manufacturing recently partnered with us to move beyond traditional security assessments and uncover real-world threats that could impact their business. Today, organisations across the... Explore Case Study
HomeServe From Hidden Documents to High-Speed Service HomeServe is a multi-national home emergency repairs and improvements company, serving over 1.5 million customers in the UK alone. The business generates a significant volume of documents for each of its customers, including policies, claims and complaints. This case study... Explore Case Study