Is that mobile app you’re using presenting a cyber security threat?

How to keep your business secure when employees use their own mobile devices and install unmonitored apps on them for work. Today, smartphones are everywhere. They are used for work every, single, day. Using a smartphone or personal laptop can boost productivity, but this unmonitored mobile technology also presents a threat to your business security. […]

What is APP fraud and how can you tackle it as a small business?

Money transfer

Authorised Push Payment (APP) fraud is spiralling in the UK. Every year, thousands of individuals and businesses suffer significant financial losses because they have no idea of how to protect themselves against it. £583.2m was lost to APP fraud in 2021 according to the latest figures1. As criminals become more sophisticated, and we spend longer […]

What does Morse Code have to do with your business security?

A phishing campaign has found a loophole, hiding malicious URLs in email attachments, by turning them into Morse code. In this post, we investigate how this supposedly outdated form of communication is making a comeback. We also provide helpful guidance on how you can protect your business against these sophisticated attacks. Cybersecurity is advancing at […]

Backup and Disaster Recovery: The definition, difference, and why you need both

Backup and Disaster Recovery (DR) are two different concepts. You can have a data backup, without a disaster recovery plan, but not the other way around. One cannot exist without the other. Here, we help you understand the definition and difference between these two approaches. This will help you to develop effective strategies to avoid […]

How to help your business navigate increased global cyber risks

What businesses can do to mitigate the increased risks and navigate the heightened security threats during the crisis, and beyond. As the world watches in horror at the unjustified military invasion of Ukraine, fears of an unprecedented cyber-war are mounting. Alongside the horrifying images of destruction, there has been an onslaught of less-visible cyber-attacks on […]

Cybersecurity Trends – Our Predictions for 2022

Stay on top of your cybersecurity over the next 12 months and beyond. Over the past two years, the world has operated in fight or flight mode. Hasty reaction to the global pandemic has led to an abrupt adoption of remote and hybrid working practices. In response to this, cybercriminals have worked at a pace […]

Updates to the Cyber Essentials Scheme, January 2022

In January 2022 the NCSC and IASME will implement an updated set of requirements for the Cyber Essentials scheme.  This will be the biggest overhaul of the scheme’s technical controls since its launch in 2014. The important changes will ensure UK businesses stay secure in the ever-changing threat landscape. The simple, yet effective Government approved Cyber Essentials […]

Everything you need to know about Penetration Testing

Penetration testing is known by many names such as ‘pen testing’ or ‘ethical hacking’. It is a crucial technique employed to acquire additional security for organisations by simulating attempted ICT system breaches. Pen testing can unearth any weaknesses that can leave your business susceptible to a cyberattack. Cybercrime is rising at an alarming rate around […]

Become a Password Pro – Tips to ensure you are secure

No matter how frustrating they can be, a password is a key to our digital lives. From bank accounts to emails, cloud services to apps, our digital footprints are growing daily. With the increase in remote and hybrid working practices, the need for passwords has never been greater. They are the first line of defence […]