Five Significant Savings with Synchronised Security With Sophos‘ decision to retire on-premise legacy security platforms and focus on next-generation products, I thought today we would have a quick look at the key advantages of synchronised security and how it can … Read More

A Hackers Guide to Remote Working
A Hacker’s Guide to Remote Working Hybrid working is brilliant news for a hacker, not in the sense that they can now work hoodie-clad in their own dark room, but because remote working means that a business is intentionally giving … Read More

Compliant. Certified. Are you secure?
Compliant. Certified. Are you secure? Since GDPR came into force the stakes have never been higher, businesses must comply with regulations to avoid huge fines. Compliance is a great way of ensuring that your organisation meets a baseline standard and … Read More

Travelex – How not to handle a Cyber Incident
Travelex – How not to handle a Cyber Incident What happened? On New Year’s eve as parties were in full swing and everyone was busy considering their new year resolutions, criminals put a devastating stop to any celebrations at Travelex. … Read More

What is a social engineering attack?
What is Social Engineering? Who presents the most dangerous threat inside your business? Most organisations would be surprised to know that overly helpful employees can be far more dangerous than the stereotypical “disgruntled employee”. Social engineering is a type of … Read More

What is Penetration Testing?
What Is Penetration Testing? Penetration Testing, or a Pen Test, is a security test that launches a mock cyber attack to find vulnerabilities in a computer system. A pen test is a way to identify vulnerabilities before attackers do, evaluate … Read More

Windows 7 – End of life, are you prepared?
Windows 7 End of Life – Are you prepared? What is happening? Microsoft are retiring a number of operating systems to End of Life to focus their efforts on supporting new technologies. Microsoft actually ended mainstream support for Windows 7 … Read More

Penetration Test Versus Vulnerability Assessment
Penetration Test Versus Vulnerability Assessment The Difference Between Technical Security Weaknesses Discovery Techniques For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two … Read More

Why your business should monitor the Dark Web
Why & How Your Business Should Monitor the Dark Web What is the Dark Web? The internet has three main parts to it: surface web, deep web, and dark web. The surface web makes up about 10% of the whole internet, and … Read More

Could your business survive a cyber attack?
Could your business survive a cyber attack? In a recent EMEA Solarwinds survey, businesses were asked ‘how long could you survive without your business data’ and 31% said they couldn’t survive beyond a week. This frightening statistic highlights the magnitude … Read More