defend against phishing attacks

How to defend against phishing attacks from trusted partners

Phishing attacks from trusted partners are harder to detect and easier to fall for. Here's what you can do to defend your business

Read More

cyber security audit

Five reasons to conduct a cyber security audit ASAP

Conducting a cyber security audit is a good starting point for identifying weak points, along with analysing the way data flows through the business and where it needs to be protected.

Read More

does zoom present a security risk

Stealing, stalking, and security breaches

Five businesses that paid the price for data theft when they received an ICO fine, with examples of employees stealing data and using it for stalking

Read More

How the world’s largest sovereign wealth fund lost $10m to hackers

How the world’s largest sovereign wealth fund lost $10m to hackers

In March 2020 the world's largest sovereign wealth fund lost 10m to hackers, through clever social enginnering by organised criminals

Read More

how to respond to a data breach

How to respond to a data breach

The cost of a data breach to a business can be catastrophic. Here we look at the way businesses need to respond should the worst happen.

Read More

law firm hacked and held to ransom

Law firm hacked and held to ransom

New York law firm hits the news after suffering a Ransomware attack by hackers, who have stolen large amounts of sensitive data

Read More

how to defend your business against ransomware attacks

How to defend your business against Ransomware attacks

The recent pandemic has seen a growth in the number of ransomware attacks. The steps individuals and organisations can take to protect themselves are in this article.

Read More

steps improving security working remotely

8 steps for improving security while your teams are working remotely

Working from home presents new cyber security challenges that must be managed. At a time when more people than ever will be working from home, many of whom are not used to it, cybercriminals are taking advantage.

Read More

does zoom present a security risk

Does Zoom present a security risk to your business?

With the increasing use of technologies such as Zoom for video conferencing, web conferencing and chat, we're sharing some security information to be implemented whilst using Zoom. We'll also look at some recent examples where problems have arisen.

Read More

five reasons to implement a disaster recovery plan

Five reasons to implement a disaster recovery plan

No business is invulnerable to issues that can arise with IT. However, the key to business continuity, containment and managing client and customer relationships is a swift and effective response to any problems that do arise.

Read More

We’re committed to making business better. Contact us to begin the journey.

Get in touch