illustration of a hybrid working environment

Does your business have the right cyber security for hybrid working?

Many businesses still haven't got the correct cyber security measures in place for hybrid working environments? Is yours one of them?
July 19, 2022 — Paul Stanyer
Close up of the face of an ethical hacker with reflection of computer screen on his lenses

What is penetration testing and how does it work?

What is it, how does it work and does my business really need one?
July 14, 2022 — Paul Stanyer
Are shared user accounts a good idea?

Are shared user accounts a good idea?

We look at the pros and cons of shared user accounts and things you need to be aware of.
June 07, 2022 — Paul Stanyer
Microsoft Office

Follina security vulnerability actively exploited in Microsoft Office

The Follina security vulnerability is the latest to affect Microsoft Office customers. What can you do to protect yourself and your staff? Here's what to do...
June 03, 2022 — Paul Stanyer
Laptop being used with hovering padlock icons depicting security

Protecting your business against phishing attacks [2022 UPDATED]

This article will help by providing some answers to these questions: What is a phishing attack? How does a phishing attack work? Who are vulnerable to phishing attacks? How can I tell a phishing email from a genuine one? How can I protect myself and my business from a phishing attack?
March 17, 2022 — Paul Stanyer
Businessman typing on his laptop

Government advice - Tighten your security now

In light of what’s happening with Russia and Ukraine, advice from the National Cyber Security Centre is urging ‘organisations in the UK to bolster their online defences’ against cyber-attacks. Although...
March 09, 2022 — Paul Stanyer
Cartoon of superhero standing with his cape blowing in the wind

Microsoft defends against cyber attacks - 70.9 billion attacks stopped

Thank you Microsoft for defending us from cyber threats. However it doesn't stop there. What other security measures should your business be taking?
February 22, 2022 — Paul Stanyer
Hacker using computer

How hackers are using phishing in ransomware attacks

Don’t push the red button! - Phishing attacks are regularly successful because people are curious and like to click on things. Learn how to protect your users from phishing attacks.
October 14, 2021 — Paul Stanyer