Search the blog:
The Scottish Government has made funding available for a new voucher scheme to help Scottish businesses and charities achieve the National Cyber Security Centre's (NCSC) Cyber Essentials certification.
Verizon’s 2017 Data Breach Investigations Report found that 81% of of hacking-related breaches leveraged either stolen and/or weak passwords.
Most cyber security news recently has focused on the revelation of Russian military intelligence service attacks, but there has been a recent announcement about cyber security practice to which organisations of all sizes including small businesses should be paying much greater attention.
GDPR has focused business leaders’ thoughts on the data held within their organisations and how best to protect it. Since the first step towards securing anything is understanding what you have, an Information Asset Register is crucial. Grant McGregor explains what an Information Asset Register is...
Everyone begins their Cyber Essentials certification process from a different starting point – but that’s what makes the scheme so important.
People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.
What do businesses need to know when making plans for disaster recovery and business continuity? We explain the difference between the terms and why there is considerable overlap between the two.
The app store abounds with apps of all kinds and picking the ones that are right for your business can be a challenge. In this article, we will run through some of the most popular apps to help small businesses improve their productivity.
It’s now a little over two months since GDPR came into force. A little longer since those panicked conversations with your boss about what you actually need to do and that inbox full of marketing emails begging you to resubscribe. What have we learnt since then?