Skip to page content
Client Hub Tel 01892 830111

Blog: Cybersecurity

Filters:

Cybersecurity: Passwords

Have you ever wondered how to create complex passwords, then this is the tutorial for you!!

Read More

Data back up: Would you like to know a secret?

Data backup is not exactly top of most people's agenda, however I am going to attempt to pique your interest. So, here we go…

Read More

Security in the hybrid workplace: what does good look like?

As the CORONApocalypse continues to fade and we all get back to whatever normal is, it's a good opportunity to look back at the changes we have made in the workplace over the last 12-16 months to keep our businesses going and ask ourselves, "is this good?".

Read More

It’s time to get serious about Cybersecurity

We always talk about the technical elements of cybersecurity, what tools, software, and processes that you should use to protect your business. Cybersecurity and data protection (or the failure to truly consider this as an essential forethought) rather than an afterthought is by far of significance importance today.

Read More

Microsoft email server hack. Is your business at risk?

We’re all aware that we need to be vigilant of our own cyber security and it goes without saying that this should be of paramount importance to any business. The news of the recent Microsoft hack is a stark reminder of just how vital it is to have cyber security monitoring in place.

Read More

How to keep your company data safe with a Dark Web Monitoring demo

A live demo of our dark web monitoring tool showing how it works, why it works and how some of the phishes steal data and leak/sell it.

Read More

Cyber Security: Playing the Blame Game

I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they're called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I'll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.

Read More

Common phishing types

Cybercrime is on the rise and the types of phishing scams are evolving, our ability to identify them has never been more important in both protecting ourselves, but also the organisations that we are part of. There are many types of phishing scams with many different tactics employed, in this article we look at some of the main phishing scams used by the criminals, the intent or nature them and advice on how to deal with them.

Read More

Spotting a phish

Phishing is the most popular form of cyber crime. It’s scam form that has been around for years from the comical prince to the current COVID-19 disguise.

Read More

The Dark Web: What is it?

The dark web is term that is used often in the news, when you hear about data breaches and in films used by clandestine groups, but do you really know what it is?

Read More

Choosing an MFA Solution

By now I'm sure you're all familiar with the terms "MFA (Multi Factor Authentication), 2FA (Two Factor Authentication) or Strong Authentication" over the last few years, for those of you that aren’t these are largely the same thing (there are some technical & semantical differences but for simplicity let's not get into those) in that they support your traditional Username & Password

Read More

Select Webinar: Cybersecurity

Join our Technical Solutions Architect as we discuss cyber security, from why you should care, security tips and working from home.

Read More

Let's get started

Book a call today to discuss
how we can work together.

Book a call Let's talk
Contact Us