Search the blog:
What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...
There’s a new attack vector in town: social media. Social is currently the fastest-growing type of phishing attack. Here’s what you need to know. We’ve covered phishing many times here on the Grant McGregor blog. We think it’s important to do so, because we all need to stay vigilant against the...
Organisations must revisit their operational strategies and business continuity planning in the wake of the COVID-19 pandemic. Here, the Grant McGregor team considers what this might mean for your business continuity planning and, especially, IT. In a recent blog, we looked at how the current...
Grant McGregor has written extensively on this blog about the growing risk from phishing, spear phishing and social engineering. Now, experts warn these risks have got an extra boost from the coronavirus pandemic. In April 2020, the UK’s National Cyber Security Centre (NCSC) launched a campaign to...
Read out most recent blog: 10 Reasons Why you Might Not Be Receiving Emails in 2025 Follow these simple steps to resolve most email receiving failures. We’re so used to immediate communications these days, that waiting for a hotly anticipated email can be incredibly frustrating. If you are...
We’re huge believers in the power of regular online training to help staff spot malicious email attacks. But what happens when that training pays off and you realise that you have a suspicious email in your inbox? What should your next move be?
It might not surprise you too much to learn that one of the most common questions we get asked in these days of COVID-19 is: can you help me with remote working? The answer is “yes”, of course. But there are a few vital issues you will need to consider.
According to the Verizon 2019 Data Breach Investigations Report, 62% of breaches not involving an Error, Misuse, or Physical action (in other words, wounds that weren’t self-inflicted) involved the use of stolen credentials, brute force, or phishing.
Your business has developed - so has good IT support.