top of page
Jan 64 min read
How to protect your business from BEC attacks: Essential tips and strategies
As we rely more and more on emails, Business Email Compromise (BEC)  attacks are a growing problem, and they can cost businesses time,...
12 views
Jun 17, 20244 min read
Booking holidays? Make sure you’re not falling for scams
Have you heard of the Booking.com scam? We explain what it is, and most importantly, how you can avoid it.
28 views
Mar 26, 20243 min read
The British Library cyber hack: One of the worst cyber incidents in British history
If you've been following ransomware news or have an interest in the vast archives housed by the British Library, you might be familiar...
184 views
Aug 18, 20233 min read
How Does Corporate Internet Discovery Protect Your Online Reputation?
In today's world where everything has become digitalised and information is freely spread, a company's reputation can be both its...
30 views
Jul 12, 20234 min read
What is Business Email Compromise (BEC)?
In today's digital world, business communication is often done via email. It offers an easy way to quickly communicate and gives you an...
65 views
Jun 26, 20233 min read
Why could Google's zip domains pose a cybersecurity risk?
On the 3rd May, Google made one of its most controversial moves yet by opting to put .zip domains on sale. Eight new top-level domains...
56 views
Jun 26, 20233 min read
Gift voucher scams: the importance of verification
It’s becoming increasingly clear that we need to be more careful than ever about online scams. Although it's not a subject we discuss...
67 views
Jul 6, 20222 min read
What cyber attacks do retailers face?
With so much customer data collected, it is no wonder that 24% of cyber attacks are aimed at retail and ecommerce stores.
21 views
Jul 22, 20212 min read
How do cyber criminals hack humans?
Social engineering is a form of cyber attack where hackers gleam personal information through very straightforward methods.
19 views
Latest News
bottom of page