top of page
Search


32% of Businesses Suffered Security Breaches in the last 12 months
The Government’s Cyber Security Breaches Survey shows that 32% of businesses identified breaches or attacks in 2023.
Apr 19, 20232 min read


How can Tourism and Travel companies stay protected from Cyber Attacks?
Travel and leisure are among the most impacted industries globally by cyber security, with digital fraud attempts rising 155.9% in 2022.
Apr 11, 20235 min read


Why is Cyber Security a big risk to Manufacturers?
Is Cyber Security a big risk to Manufacturers? We explore the facts and how a manufacturing business can stay secure from cyber attackers.
Apr 10, 20233 min read


Don't Overlook the Mental Impact of Cyber Crimes
The mental impact of dealing with a cyberattack as a victim is often overlooked, and we concentrate on the financial impact.
Apr 5, 20233 min read

Nurseries and Childminders are appealing targets for Cyber-Attackers
Preschool providers and childminders increasingly rely on technology and have become an appealing target for cyber-attacks.
Mar 30, 20233 min read


Are these Cybersecurity Myths making you look a Fool?
There is a lot of misinformation in the world of cybersecurity and cybercrime. We wanted to bust five of the biggest cybersecurity myths.
Mar 24, 20235 min read

What is Brand Impersonation? - and How can I Protect my Business?
Brand Impersonation is where an e-commerce website or social media account is imitated for fraud. We discuss how you can stay protected.
Mar 23, 20234 min read

How can I Secure my Website from the Most Common Vulnerabilities?
A Website Vulnerability Assessment addresses the security of your website to secure any vulnerabilities an attacker might look to exploit.
Mar 22, 20233 min read

How do you ensure new devices are secure from cyber attacks?
Our New Device Checklist for Employers aims to help businesses improve their cybercrime resilience and secure their employees' devices.
Mar 21, 20236 min read

New Microsoft Office Threat: OneNote Documents filled with Malware
Look out for threats when using Microsoft Office; cyber attackers have been using Microsoft OneNote documents to launch malware attacks.
Mar 20, 20233 min read

Simulated Phishing Exercise - What is it and Who needs it?
A Simulated Phishing Exercise is a test where Phishing emails are sent to your staff members to see if they can spot the latest scams.
Mar 8, 20232 min read


What is a Network Vulnerability Assessment? Why does my business need one?
A vulnerability assessment is a process of identifying existing weaknesses within your network. It can be host-based, network-based, wireles
Mar 7, 20233 min read
bottom of page