We are forty years into the advent of phishing attacks! It began in the 1980s’ when a phising technique was described in detail to a HP users Group, Interex. Since then campaigns have become more and more devious. In the era of the Covid Pandemic, whilst many people were already dazed and confused by the onslaught of day to day …
15 ways to protect your business from a cyberattack
Please find our new crib sheet. 15 Ways to Protect your business from a Cyberattack. If you need help with your strategy for cyber security please contact us.
How does Cloud Technology Benefit Not For Profits
Charities and voluntary sector businesses must operate at optimum and ensure they get the best value for money. Technology has become increasingly important, and if the systems don’t operate properly, this can affect time-critical service delivery and projects. If your charity or organisation has not moved across yet, there are some key considerations to make. What is the business case …
Ukrainian Malware Attacks: Fake Ransomware Explained and why your business must be cyber-aware
Ukraine finds itself the centre of attention once more as troops from all sides gather at its borders. The Mainstream media sets about its rhetoric of subtle and persistent biases and succeeds in stoking fear and paranoia among their audiences. Western media is now focused on reporting that Russia is supposedly threatening an invasion, and that this strife between the …
What is all the fuss about Passwordless Authentication?
Poor password hygiene remains a key security weakness for many businesses. All employees know that a password should be long, complex, unique and never shared with anyone. Although this is simple in theory, in practice it can be difficult to remember a new complex password for every application or system. For this reason, it is common for employees to re-use …
Cybersecurity for Small and Medium Businesses – Q & A time
It is no surprise that the past 2 years of remote and hybrid working has significantly accelerated digital transformation for most small and medium businesses. Although the implementation of new technologies has changed the way that these businesses function, it may have also created many potential security risks. As businesses move into 2022, it is important that all small and …