How to defend against phishing attacks from trusted partners
Phishing attacks from trusted partners are harder to detect and easier to fall for. Here's what you can do to defend your business
Five reasons to conduct a cyber security audit ASAP
Conducting a cyber security audit is a good starting point for identifying weak points, along with analysing the way data flows through the business and where it needs to be protected.
Stealing, stalking, and security breaches
Five businesses that paid the price for data theft when they received an ICO fine, with examples of employees stealing data and using it for stalking
How the world’s largest sovereign wealth fund lost $10m to hackers
In March 2020 the world's largest sovereign wealth fund lost 10m to hackers, through clever social enginnering by organised criminals
How to respond to a data breach
The cost of a data breach to a business can be catastrophic. Here we look at the way businesses need to respond should the worst happen.
Law firm hacked and held to ransom
New York law firm hits the news after suffering a Ransomware attack by hackers, who have stolen large amounts of sensitive data
How to defend your business against Ransomware attacks
The recent pandemic has seen a growth in the number of ransomware attacks. The steps individuals and organisations can take to protect themselves are in this article.
8 steps for improving security while your teams are working remotely
Working from home presents new cyber security challenges that must be managed. At a time when more people than ever will be working from home, many of whom are not used to it, cybercriminals are taking advantage.
Does Zoom present a security risk to your business?
With the increasing use of technologies such as Zoom for video conferencing, web conferencing and chat, we're sharing some security information to be implemented whilst using Zoom. We'll also look at some recent examples where problems have arisen.
Five reasons to implement a disaster recovery plan
No business is invulnerable to issues that can arise with IT. However, the key to business continuity, containment and managing client and customer relationships is a swift and effective response to any problems that do arise.