Latest from our business, security
and technology blog

Search the blog:

    2023-09-04 15:20:00

    Tips for successfully implementing a zero-trust approach to cyber security

    As increasing numbers of businesses have moved to a cloud environment and remote working models, Zero Trust has gained a place in the everyday cyber security approaches of many organisations.

    2022-08-03 15:40:23

    China: the new security risk?

    Last month, the joint heads of MI5 and FBI came together to issue a joint warning to businesses in the UK, the USA and Europe about the risks presented to business by Chinese state. Grant McGregor takes a look at the scope of those warnings and discusses what it means for businesses like yours and...

    2022-04-28 09:42:34

    How to implement multi-factor authentication

    Multi-factor authentication (MFA) adds an extra layer of protection for your network access and user accounts. It costs little or nothing and is easy to implement – so, if you haven’t already, it’s a good idea to implement MFA.

    2022-04-05 08:00:00

    Agencies warn of Russian hacker threat on MFA

    New warnings have been issued by US Federal agencies about the increased threat of Russian cyber attackers. The latest warning pertains to multi-factor authentication. Please read on for more details. The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a new security alert in...

    2022-02-16 16:34:24

    Microsoft blocks 1,000 malicious emails a second

    Microsoft’s recently revealed that more than 35.7 billion malicious emails were sent to its customers last year. Fortunately for us, the tech giant blocked 1,000 of these malicious emails every second of 2021. That’s about 31.5 million seconds.

    2020-08-10 07:30:00

    How to ensure web applications used in your business are secure

    What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

    2019-08-19 13:27:26

    On the Blacklist

    The National Cyber Security Centre says maintaining a password blacklist is an essential part of good password security. We take a look at what should be on your blacklist and how to go about enforcing it.

    2019-06-25 10:26:02

    Doubling up: why two-factor authentication is your next step in digital security

    We’ve written about the need for additional layers of security for passwords, especially given the increased targeting of Microsoft’s Office 365 as more and more businesses and individuals migrate to the cloud, especially for email.

    2019-06-11 09:12:23

    Are Your Websites and Applications Secure?

    What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

    1 2