Blog
MFA: Your Business’s Digital Bodyguard
Discover how multi-factor authentication (MFA) can protect your business from cyber threats. Learn the best MFA methods, how AI is improving security, and what to watch out for.
Strong Passwords Still Matter: Protecting Your Accounts in the Age of AI
Discover why strong passwords still matter in the age of AI. Learn how to protect your accounts with password managers, MFA and smarter habits during Cyber Security Awareness Month.
Don’t Get Caught Out: How to Spot and Report Scams
Learn how to spot and report scams during Cyber Security Awareness Month 2025.
Discover key red flags, common scam tactics, and how businesses can protect their teams and data.
Fake Antivirus Software: A Growing Threat
Cyber criminals are faking antivirus sites to spread malware. Learn how to spot the scams, protect sensitive data, and avoid costly cyber attacks.
MFA Isn’t Bulletproof: How to Protect Your Microsoft 365 Data from Session Hijacking
A growing threat called session hijacking is bypassing MFA entirely, and it's already being used to target Microsoft 365, Microsoft personal accounts and Google accounts like yours. Here's what you need to know.
What is the Principle of Least Privilege (PoLP) and How Can Your Business Benefit?
Discover how the Principle of Least Privilege (PoLP) can protect your business from cyber threats, reduce human error, and streamline operations — all by giving people access to only what they need. A simple change that makes a big difference.
Public Wi-Fi: Great for Coffee, Terrible for Cyber Security
Public Wi-Fi might be convenient, but it’s also a playground for cyber criminals. We break down the risks and share simple steps to keep your business data safe while you're on the go.
7 Ways Hackers Can Break Into Your Accounts (And How to Stop Them)
In this guide, we’ll lift the lid on seven lesser-known hacking tactics you should be aware of, and what you can do to stay one step ahead.
Should You Be Concerned About the Rise in Cyber Attacks? – Here’s What You Need to Know
The news surrounding the recent cyber attacks on M&S, Co-op and Harrods, could lead you to thinking that its only big businesses affected by these sort of incidents. Sadly this just isn't the case. Here's what you need to know.
How to Build a Solid Business Recovery Plan
Businesses that bounce back quickly after an incident have one thing in common - they had a plan. We explain whats needed to build a solid business recovery plan. We've even created a free checklist for you to download.
How to Minimise Ransomware Damage
What is Ransomware, how does it work and more importantly how to I protect my business from it. We answer all the above and more.
How to Spot a Phishing Email
With over 85% of successful data breaches or cyber attacks beginning with a phishing email, it's so important to know how to identify one. We'll show you how.
Guides
2025 Guide to Good Cyber Security
What's in the guide?
- How to spot risks
- 12 actionable steps to stay secure
- What to do after an attack
- Expert advice from cyber security pros
