Blog

Category: Cyber Security

Top 12 security tips for Christmas

Top 12 security tips for Christmas

Buckle up! It’s not just the Grinch who wants to steal your Christmas. Those pesky cybercriminals don’t suddenly find festive spirit and sign...

More
Got any ID? The rise of online identity theft

Got any ID? The rise of online identity theft

Have you ever received an email from a Nigerian prince? You know, the one where he says that you have a huge sum of money waiting for you in a ba...

More
Can you tell a legitimate business email from a fake?

Can you tell a legitimate business email from a fake?

If you think cyber-criminals only target the big players and wouldn’t be interested in your small business, think again. Increasingly, it’s s...

More
10 ways to secure your IT environment

10 ways to secure your IT environment

How can you protect your business in cyber space? With data breaches and cyber-attacks occurring on a daily basis, the threat to your business is...

More
How resilient is your business to cyber threats?

How resilient is your business to cyber threats?

We get it. As a small business owner, you’re spinning an awful lot of plates. There are tasks on the backburner that never quite make it to the...

More
Cyberattacks: How to worry less about this major risk to your business

Cyberattacks: How to worry less about this major risk to your business

Does the fear of a cyberattack keep you up at night? Well, you’re not alone. It’s the number one worry of business owners around the world. A...

More
Overcome the risks of public AI models with your own private ChatGPT

Overcome the risks of public AI models with your own private ChatGPT

Many users in small and medium-sized businesses are starting to benefit from the value that artificial intelligence (AI) can bring to everyday wo...

More
Test and train: how to prepare your people to spot a phishing attack

Test and train: how to prepare your people to spot a phishing attack

In partnership with Brigantia, we look at how phishing simulations can help you identify and mitigate malicious attacks on your organisation. You...

More
What are the risks of tape backup?

What are the risks of tape backup?

Magnetic tape was once the favourite solution for data backup purposes – and even in the wake of cloud and hybrid backup, it remains so...

More
What is Penetration Testing?

What is Penetration Testing?

It seems unthinkable: asking an outsider to break your cyber security and demonstrate just how easily they can rifle through your systems. Yet pe...

More
5 Reasons why your printers are vulnerable to Cyber Attacks

5 Reasons why your printers are vulnerable to Cyber Attacks

The humble printer has been a staple of the office for decades now – and they’ve come a long way since Epson released the first electroni...

More
Microsoft 365 – securing your data in the Cloud

Microsoft 365 – securing your data in the Cloud

Microsoft 365 (formerly Office 365) is one of the most widely used cloud products on the market today Through the tools available, organisations ...

More
What is IT Support and why do you need it?

What is IT Support and why do you need it?

Information technology: it’s essential to any modern business, but its rapid evolution and growing complexity can bewilder all but the brightes...

More
This Domino’s phishing email is a real ‘pizza work’

This Domino’s phishing email is a real ‘pizza work’

At half 1 on a Thursday afternoon, having worked my way through a pile of documents, this humble Mirus employee felt a violent rumbling in their ...

More