Search the blog:
Email poses perhaps the greatest risk for organisations in terms of cyber security.
It's not long now until our Cyber Essentials event on Thursday 26th September and the places are filling up quick! Click the link at the bottom of this blog to register now and ensure your place.
Phishing is the most pernicious type of cyber-attack. While you can stop some phishing attempts with your security tools, it’s almost inevitable that some will reach their intended targets. This means educating your people has to be a key plank in any phishing defence strategy.
The Windows 7 operating system was launched by Microsoft on October 22, 2009, and there remain many people and organisations in the UK who are using it. If you’re one of them, you need to act now to upgrade before it goes out of support on January 14 next year.
Staying safe online isn’t just a message we need to share with our kids. We all need to stay abreast of the latest scams and dangers so we can stay safe.
The National Cyber Security Centre says maintaining a password blacklist is an essential part of good password security. We take a look at what should be on your blacklist and how to go about enforcing it.
We might think we know about the perils of social media: distraction from real life, difficulty switching off, anxiety, FOMO (fear of missing out) and heightened stress. But this misses perhaps the most dangerous peril: the use of the information you share by cyber criminals who want to target you.
The largest private forensics provider in the UK has paid a ransom to hackers after its IT systems were compromised by a cyber-attack. Is this the new normal? And what can businesses learn from the Eurofins experience?
Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?