A bumper Patch Tuesday – get updating now!!!

We have a record number of patches, 150, released today and an additional 22 released since March's Patch Tuesday. This brings the total number of patches for the past month to (...drum roll...) 172 vulnerabilities

Read the article
Phishing, Vishing, BEC

How social engineering attempts to catch us all out, and make us do things we wouldn’t ordinarily do.

Read full article >

Banks and Financial Institutions have always been rich pickings for the cyber criminal. And will continue to be so…….

Read full article >

If you have nightmares about your business suffering a cyber security breach, you probably think about shadowy criminals out there on the dark web.

Read full article >
assured

A year that’s seen security breaches in organisations ranging from Microsoft to the Red Cross shows us that no-one is safe from cyber-criminals.

Read full article >

Ransomware attacks on financial services organisations, such as banks and investment firms, have risen sharply over the past year.

Read full article >
assured

Have you ever had to search for an email another organisation claimed to have sent you, only to find it languishing in your spam folder? That can be annoying — but imagine if it were the other way round. What if it were your emails being marked as spam? In general, the efforts organisations put…

Read full article >

In 2021 alone, email spoofing and phishing increased by 220%.  And despite billions having been invested into perimeter and endpoint security over the last two years, phishing and business email compromise (BEC) scams continue to be the primary attack vectors into organizations, often giving threat actors the toehold they need to wreak havoc on companies…

Read full article >

So just how many SMBs discuss cyber security at a board level? When was the last time you actually had a meeting with your current service provider around cyber security strategy and controls?

Read full article >

Passwords are not going away any time soon. It is an ubiquitous authentication method deeply entrenched in legacy and modern apps and websites.

Read full article >

5 Essential Cyber Security Pointers for Small Business

Read full article >

What You Should Demand From Your Security Awareness Training?

Read full article >

Cyberattacks targeting Ukraine

Read full article >

Cyber Essentials — Should It Be Mandated in SMBs

Read full article >

IT’S NOT UNCOMMON FOR COMPANIES TO EXPERIENCE CYBERATTACKS, A SINGLE SUCCESSFUL ATTACK IS POTENTIALLY DEVASTATING.

Read full article >

WHY IT’S A BIG DEAL AND WHAT YOU CAN DO ABOUT IT

Read full article >

WELL TECHNICALLY THE ANSWER IS: BOTH.

Read full article >

EVER HEARD OF THE TROJAN HORSE?

Read full article >
Woman at computer

THINK YOUR BUSINESS IS TOO SMALL TO BE A VICTIM? THESE STATS WILL MAKE YOU THINK AGAIN…

Read full article >

PHISHING IS A TECHNIQUE USED BY HACKERS TO GAIN ACCESS TO YOUR PERSONAL INFORMATION, SUCH AS USERNAMES AND PASSWORDS.

Read full article >

IN A SHORT MATTER OF TIME RANSOMEWARE HAS BECOME A HUGE THREAT AND FOUND ITS WAY INTO EVERY NOOK AND CRANNY OF THE WORKING WORLD.

Read full article >

TECHNOLOGY IS A GREAT WAY TO MANAGE YOUR BUSINESS, BUT IT CAN ALSO BE THE DOWNFALL OF YOUR ORGANISATION.

Read full article >

YOU’RE IN THE MIDDLE OF A STAFF MEETING WHEN YOUR PHONE RINGS. IT’S YOUR TECH SUPPORT TEAM.

Read full article >
Twitter feed is not available at the moment.