top of page

Jan 203 min read
How to stay cybersecure whilst working remotely
Remote and hybrid work have become the new normal for many companies around the world. While working from home (or anywhere) offers...
32 views

Nov 21, 20245 min read
Social media hacking: How to safeguard your accounts
Social media has become such a huge part of our lives that it’s easy to forget just how vulnerable we can be on these platforms.  Whether...
23 views


Jul 30, 20243 min read
Beyond passwords: The future of Multi-Factor Authentication
We think it’s fair to say that cybersecurity has never been more important . With cyber threats becoming more common and sophisticated,...
53 views


Jul 24, 20244 min read
What are the risks of using personal devices for work?
With the growing trend of remote work  and mobile technology, the lines between personal and professional lives are becoming increasingly...
100 views


Jul 12, 20234 min read
What is Business Email Compromise (BEC)?
In today's digital world, business communication is often done via email. It offers an easy way to quickly communicate and gives you an...
65 views


Jun 26, 20233 min read
Why could Google's zip domains pose a cybersecurity risk?
On the 3rd May, Google made one of its most controversial moves yet by opting to put .zip domains on sale. Eight new top-level domains...
56 views


Jun 19, 20233 min read
The critical importance of cyber insurance
Nobody likes to think about insurance until they must, but it’s been a key factor in business resilience for many centuries. It remains...
37 views


Jun 15, 20232 min read
URGENT: MOVEit transfer breach
The UK's National Cyber Security Centre (NCSC) shared some important details about an incident at Zellis, a company that’s suffered a...
73 views


Jan 25, 20232 min read
WFH? How to ensure your employees are working safely online
Working from home (WFH) can present new challenges for both employees and employers, especially when it comes to ensuring that work is being
66 views


Jul 6, 20222 min read
What cyber attacks do retailers face?
With so much customer data collected, it is no wonder that 24% of cyber attacks are aimed at retail and ecommerce stores.
21 views

Jan 18, 20223 min read
Cyber-attacks cost UK manufactures up to £25,000 last year
The WMCRC warns manufactures of increasing threat posed by cyber-attacks and offers support to help businesses protect themselves.
48 views

Latest News
bottom of page