Blog
The most secure web browsers: A balanced overview
Web browsers are the gateway to us getting online, but which one is the right one to use? We look at the safety and privacy of some of the main players.
Navigating the waters of cyber insurance: A comprehensive guide
The terms ‘cyber’ and ‘insurance’ invoke negative thoughts, but the reality is that the threats to your business are real. Our blog will help you understand what cyber insurance is, what it covers and more.
VPN vs. DNS filtering
As the parameters of the traditional office boundaries blur, securing the broader virtual workspace has become a concern. Read how VPN and DNS filtering can help calm those worries.
Staying secure while working from home: The importance of using a VPN
The need for high level online security is vital for any business, but are your remote workers being overlooked? Do they have the correct level of cyber security they need?
Simplify and strengthen your online security with a password manager
Passwords… we all hate them. But we can make life more simple and stress free by using a password manager. Here's what you need to know on the subject...
The crucial need for data backup: Safeguarding your business's vital assets
In this article, we explore what data backup is, why it's important, what needs backing up, and how to effectively implement a backup strategy.
How to choose the right MFA solution for your business
Looking to implement MFA in your business? In this article you'll learn about different types of MFA, what to consider when implementing it, and how to choose the right one for your business.
Dangerous online behaviour among young people
If you employ young people, be aware of the worrying online behaviour and attitudes that have become normalised for them.
5 Ways to strengthen data privacy at work
Here's a few eye-opening stats and ways to improve your data privacy.
Stay safe this holiday season
Don't let your guard down this holiday season. Watch out for these scams.
Don't be lazy... It's time to switch on MFA
We look at what Business Email Compromise (BEC) is and a simple change you can make to help prevent your business being subject to a BEC attack.
Deepfakes - An increasing threat
What is a deepfake, what are the dangers and how do you defend yourself and your business from them?
Guides
The CrowdStrike Outage Explained
Download our free guide which summarises everything you need to know about the recent CrowdStrike outage including the impact on business.
A Guide to Cyber Essentials Certification
Being Cyber Essentials Certified is your shield against cyber threats, enhancing your business's resilience. Our guide is a comprehensive tool to navigate its intricacies, ensuring your digital fortress is robust.
How to meet the challenges of company policy management
Our guide - How to Meet the Challenges of Company Policy Management, is your beacon in the murky waters of policy management. It meticulously unravels the challenges you may face and offers practical solutions.