Phishing is a common and widely used form of cyber attack with the intent to steal, damage and encrypt user data. This form of cyber attack usually happens through email…
A virtual private network (VPN) is the closest that you can get to real anonymity online. VPN is a service that aims to keep users safe when browsing public networks…
The cyber essentials certification process assesses a set of controls that provide basic cyber security for all types of organisations. Cyber essentials involve a self-assessment questionnaire of these controls, ensuring…
Cyber essentials is a UK government-backed scheme intended to help organisations protect themselves against a whole range of most common types of cyber threats.
Cyber security is one of the biggest threats that small businesses face. It’s a common misconception that cyber attackers will target large corporations, as the damage or profit will be…
Businesses, particularly over the recent years, have adapted and grown to the idea of working from home cultures. But this change hasn’t come without its fair share of challenges for…
It’s a known fact that third-party risks are unavoidable in supplier-buyer relationships. One way that you can provide significant cyber security for your business is through the use of a…
Christmas is a time where many of us wind down and take time away to spend with the nearest and dearest. However, this is also a time where cyber attackers…
GoDaddy, a domain registrar and web hosting company, has recently confirmed that up to 1.2 million of their customer data has been breached after hackers gained access to their Managed…
The shift to remote working was initially triggered as a result of the pandemic and continued to remain in place by many businesses. However, this unexpected and rapid shift has…