Search the blog:
As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.
Gone are the days when the limits of your security cordon were the walls of the datacentre. Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.
A lot of people believe that the password is an invention of the age of computing, a necessary part of securing IT systems from hackers and other malevolent forces – intentional or unintentional. In truth, the password is about as old as human civilisation.
Wow! Quite a weekend of news around Cyber Security... This was an article we had written a couple of weeks ago now and had scheduled for publication today just for the sake of offering our readers and supported end-users ongoing education about cyber security and playing your part...
Some level of IT expenditure is necessary in a business world that’s increasingly driven by technology.
Phishing scams are incredibly common nowadays. Luckily anyone who uses a computer on a daily basis is now very used to ignoring the most obvious types of phishing emails with poor spelling or grammar in the content; not to mention that those that are sent out en masse will nearly always be caught...
With flexible working on the increase, more small businesses than ever are effectively working in a virtual office.
Small & Medium Enterprises (SMEs) or Businesses are vital to the UK economy, driving growth and ensuring employment.
There’s much hype about the Internet of Things (IoT) and the endless possibilities of a hyperconnected future. However, 2016 saw a number of DDoS attacks in which attackers exploited inherent security vulnerabilities in IoT devices to take down big name websites such as Twitter, Netflix and Spotify.