top of page

Disaster recovery in the cyber supply chain: Is your business prepared?
Let’s imagine a scenario for a second; one of your key suppliers gets hit with a cyberattack. Their systems go down, their data is locked...
2 days ago4 min read
5 views

Social engineering and open-source intelligence (OSINT): What you need to know to protect yourself
Sharing personal information online has become a regular part of our daily routines. Whether it's a post on social media , a casual...
6 days ago4 min read
10 views

Device security: iOS 18 password app and password managers
Managing passwords can be a bit of a hassle. Many of us have dozens — maybe even hundreds — of online accounts , so remembering your...
Feb 263 min read
17 views

Pineapples and man-in-the-middle attacks (MIM)
Have you ever grabbed your laptop at a coffee shop, connected to the free Wi-Fi, and got to work without a second thought? You’re not...
Feb 53 min read
61 views

How to stay cybersecure whilst working remotely
Remote and hybrid work have become the new normal for many companies around the world. While working from home (or anywhere) offers...
Jan 203 min read
38 views

How to protect your business from BEC attacks: Essential tips and strategies
As we rely more and more on emails, Business Email Compromise (BEC)  attacks are a growing problem, and they can cost businesses time,...
Jan 64 min read
43 views

The rise of deep fake and AI manipulation: What you need to know
Have you ever seen a video of a celebrity saying something outrageous or a politician making a shocking statement that seems too wild to...
Dec 15, 20243 min read
24 views

Cybersecurity on a budget: How Cyber PATH services can help small businesses and charities
Cybersecurity is essential for every organisation, but hiring a professional cybersecurity firm can be incredibly expensive, putting this...
Dec 9, 20243 min read
30 views

Social media hacking: How to safeguard your accounts
Social media has become such a huge part of our lives that it’s easy to forget just how vulnerable we can be on these platforms.  Whether...
Nov 21, 20245 min read
25 views

Test your website security with our First Step Web Assessment
We know that keeping your website secure can feel like an uphill battle. With a barrage of potential cyberattacks looming around every...
Nov 13, 20243 min read
38 views

Train hacking news: The dangers of open networks
If you've watched or read the news recently, you’ll definitely have heard about the recent train hack. The incident has sparked fresh...
Oct 9, 20243 min read
72 views

Beware of QR code fraud: How to protect yourself
QR codes have become a normal part of our daily lives. Whether it’s scanning a code to check a restaurant menu, paying for parking, or...
Sep 26, 20244 min read
42 views

How to ensure that your employees understand common emergency practices, including cybersecurity
As an employer, ensuring that your employees understand common emergency practices is essential for maintaining a safe and...
Sep 26, 20244 min read
32 views


Beyond passwords: The future of Multi-Factor Authentication
We think it’s fair to say that cybersecurity has never been more important . With cyber threats becoming more common and sophisticated,...
Jul 30, 20243 min read
58 views


What are the risks of using personal devices for work?
With the growing trend of remote work  and mobile technology, the lines between personal and professional lives are becoming increasingly...
Jul 24, 20244 min read
108 views


Ensuring operational resilience: Disaster recovery and business continuity in the age of cybercrime
Cybercrime is a growing threat to businesses of all sizes . With more sophisticated attacks like ransomware, phishing, and advanced...
Jul 15, 20243 min read
50 views


Protecting vulnerable data in the care sector
The care sector holds a lot of sensitive data and protecting it comes with a unique set of challenges.
Jul 9, 20243 min read
15 views


Harnessing AI Safely: Navigating the Cybersecurity Landscape
AI is raising a lot of questions, from how to navigate it to AI’s impact on cybersecurity. We share how to use AI safely here.
Jun 25, 20244 min read
37 views


Booking holidays? Make sure you’re not falling for scams
Have you heard of the Booking.com scam? We explain what it is, and most importantly, how you can avoid it.
Jun 17, 20244 min read
28 views


Protect your finances: Be aware of BACS scams
What are BACS scams and how can you avoid them? We show you a real-life example and actionable steps you can take to protect your finances.
May 14, 20243 min read
431 views

Latest News
bottom of page