Latest from our business, security
and technology blog

Search the blog:

  • There are no suggestions because the search field is empty.
2019-08-06 15:40:40

What Can We Learn from the Eurofins Ransomware Case?

The largest private forensics provider in the UK has paid a ransom to hackers after its IT systems were compromised by a cyber-attack. Is this the new normal? And what can businesses learn from the Eurofins experience?

2019-07-30 08:28:18

The New Rules for Passwords in 2019

Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

2019-07-16 13:36:55

Secure Yourself this Summer! How to Holiday with Peace of Mind

Summer is here! And if you’re about to jet off on holiday, IT security is probably the last thing on your mind. Thoughts of malware, spear-phishing and anti-virus are perhaps not as high on your agenda as sun, sea and sangria.

2019-07-08 07:30:36

The Ever-Growing Attack Surface of IoT: Your Questions Answered

The impact of the Internet of Things is already making itself felt in our homes and in our everyday lives. This means an ever-growing threat for businesses as they try to keep pace with the new threats these devices present.

2019-06-25 10:26:02

Doubling up: why two-factor authentication is your next step in digital security

We’ve written about the need for additional layers of security for passwords, especially given the increased targeting of Microsoft’s Office 365 as more and more businesses and individuals migrate to the cloud, especially for email.

2019-06-19 14:12:53

Outlook – Cloudy

We recently published an article relating to email and the evolution of cybercrime and another referring to the rising popularity of Microsoft’s Office 365 suite and the growing security risks associated with it.

2019-06-11 09:12:23

Are Your Websites and Applications Secure?

What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

2019-06-04 11:00:10

From Spam to Phish – Cyber Crime on a Plate

Email – love or hate it as a form of communication, it touches most of us everyday and shows no signs of going away. This is especially true in the workplace where it hasn’t yet been dislodged by the various messaging apps as the preferred medium to send information.

2019-05-27 12:37:47

How to Address the Dangers of Personal Devices for Work

What happens when an employee downloads a virus onto one of their personal devices that you have allowed access your company systems? Grant McGregor takes a look at an emerging weak spot in many companies’ defences.

9 10 11 12 13