Just Firewalls: The Hacker that Stole Christmas

Settle in for our festive fable which highlights the benefits of good cyber security, and what can happen to a small business’s Christmas without it… In a nation of pet lovers. furry friends abound We all want to treat...

READ MORE

The Psychology of Passwords: Why We Choose Weak Ones and How to Overcome It

In today’s digital age, passwords play a crucial role in securing our online accounts and protecting sensitive information from cyber threats. Despite the growing awareness of the importance of strong passwords, many people still use weak and...

READ MORE

Windows 2012 Retirement: The Implications and Importance of Upgrading

Windows Server 2012 has reached its end of life (EOL) or end of support (EOS) date, which means that Microsoft will no longer provide security updates, bug fixes, or technical support for this operating system version. In this article, we will...

READ MORE

11 Clear Signs Your Network Security Needs Updating – ASAP!

When was the last time you evaluated your organisation’s network for functionality and security? Be honest! Signs that you need to update your network, network security, and network monitoring solutions aren’t always obvious. But not keeping...

READ MORE

What is Multi-Factor Authentication? And, Why We ALL Need it!

Password hacking is still big business in cybercriminal circles. Microsoft’s Digital Defense Report 2022 found that 921 password-based attacks take place every second. The same report states that 90% of accounts that suffer a hack aren’t...

READ MORE

What is a Firewall? And Why Does Every Business Need One?

When putting together an IT network, many of us know that a firewall is a “must have”. But what exactly is a firewall? What does it do? How does it protect a network? And does it keep you safe from all kinds of online crime? You see,...

READ MORE

Boost Your Network Security By Considering These Three Things

Lots of good things come in threes. The Pyramids at Giza. Goals in a hat trick. Books in Lord of the Rings. Examples in this list… no wait… But there are also three crucial considerations when securing your network. Whether you’re a...

READ MORE

Business Firewall Buyers Guide: How to Choose a Firewall

Sourcing a firewall for your business is rarely as simple as heading to a supplier and saying “I’ll have that one please.” With myriad options on the market and countless product data sheets available online, choosing a business firewall can...

READ MORE

Stay Safe Online: How to Identify 7 Types of Social Engineering Attacks

What do you think is the most effective and potentially devastating way for a criminal to launch a cyber attack on a business? Directly hacking through the firewall? Waiting for someone to happen across the attacker’s malware online? Maybe...

READ MORE

 9 Practical Ways to Strengthen Your Company’s Mobile Security

It’s an unavoidable security reality: portable devices like laptops, smartphones, and tablets require a bit more security consideration than static devices that “live” on site. But their sheer lose-ability and steal-ability is just one...

READ MORE

8 Curious Cyber Attack Symptoms, What They Mean, and What to Do

The longer it takes to identify and contain a cyber breach, the more costly the breach becomes. But don’t just take that from us, it comes to us from industry bigwigs IBM. In their 2021 “Cost of a Data Breach” study, they found that it...

READ MORE

2022 Cyber Security Trends: Top 5 Threats to Watch Out for This Year

The so-called cybercrime “industry” never stands still. Cybercriminals are always ducking and diving to evade new security defences and to maximise their profits. According to the boffins at security vendor SonicWall, 2021 was a...

READ MORE