The ever changing threat scape faced by organisations on a daily basis can keep staff, owners, and investors up at night. The ever present threat of a malicious cyber-attack can destroy an organisation no matter how big it is. How to combat and protect invaluable data in this cyber mine field? The answer lies in security log collection and analysis. What are logs? Logs, or security logs, are essentially record events either on a single device or a network as a whole. Logs record data such as logon events, object access, policy changes, privilege use, and system events just to name a few things recorded. Why are logs essential to cyber security?