Latest from our business, security
and technology blog

Search the blog:

    2025-06-06 17:28:38

    Phishing, Ransomware, Data Leaks: Lessons from Recent UK Cyber Attacks

    Following data breaches at Marks & Spencer and the Co-op, the education sector has become the latest target.

    2025-06-05 10:45:41

    Certified Cyber Advisor: Expert Guidance on Cyber Security

    With cyber attacks affecting industries from education to retail across the UK, it’s more important than ever to strengthen your organisation’s cyber defences. Many organisations, particularly those without in-house expertise, struggle to know where to start. That’s where the Cyber Advisor Scheme...

    2025-04-17 15:39:00

    Microsoft to Enforce DMARC: What to Do Before 5 May 2025

    Microsoft has announced new email security rules that could prevent your business emails from being delivered. Or worse, leave your domain wide open to impersonation. From 5 May 2025, Microsoft will begin enforcing DMARC, along with SPF and DKIM, for any organisation that sends more than 5,000...

    2025-03-27 15:21:54

    Cyber Essentials 2025 Update: Goodbye Montpellier, Hello Willow

    The UK Government's Cyber Essentials scheme is evolving once again. From 28 April 2025, the new Willow self-assessment questionnaire will replace the current Montpellier version, marking a significant shift in the way organisations approach cyber security compliance. If your organisation is already...

    2025-03-04 13:56:42

    Protect Your Brand: Why DMARC is Essential for Modern Organisations

    Did you know that an estimated 3.4 billion spam emails are sent every day1? It's a significant risk to your brand, your customers and your email deliverability. As cyber threats continue to evolve, modern organisations need more than basic security.

    2025-02-05 16:10:08

    Guide: Your email signature could be a security weak point

    When was the last time you thought about your email signature as a potential security risk? For most organisations, the answer is probably never. The reality is that email signatures - those polished, professional blocks of text at the bottom of emails - can be exploited by cybercriminals to launch...

    2025-01-30 16:04:33

    Why Your Technology Company Should Certify for Cyber Essentials

    As cyber threats continue to evolve, it is crucial for the technology sector to prioritise strong cyber security measures.

    2024-12-11 14:16:06

    Guide: Cyber Security Training - Your Best Defence

    Cybercrime continues to evolve, and small and medium-sized businesses are some of the biggest targets. With fewer resources dedicated to security, these organisations are often seen as easy prey for cybercriminals.

    2024-11-27 14:42:24

    Impersonation in Action: How Fake IT Support Threatens Your Security

    In the world of cybersecurity, there are few threats as deceptively simple yet devastatingly effective as social engineering. These attacks exploit the human element - tricking individuals into granting access, revealing sensitive information or performing actions that compromise their...

    1 2 3 4 5