What is penetration testing and how does it work?
What is it, how does it work and does my business really need one?
Are shared user accounts a good idea?
We look at the pros and cons of shared user accounts and things you need to be aware of.
Follina security vulnerability actively exploited in Microsoft Office
The Follina security vulnerability is the latest to affect Microsoft Office customers. What can you do to protect yourself and your staff? Here's what to do...
Protecting your business against phishing attacks [2022 UPDATED]
This article will help by providing some answers to these questions: What is a phishing attack? How does a phishing attack work? Who are vulnerable to phishing attacks? How can I tell a phishing email from a genuine one? How can I protect myself and my business from a phishing attack?
Government advice - Tighten your security now
In light of what’s happening with Russia and Ukraine, advice from the National Cyber Security Centre is urging ‘organisations in the UK to bolster their online defences’ against cyber-attacks. Although...
Microsoft defends against cyber attacks - 70.9 billion attacks stopped
Thank you Microsoft for defending us from cyber threats. However it doesn't stop there. What other security measures should your business be taking?
How hackers are using phishing in ransomware attacks
Don’t push the red button! - Phishing attacks are regularly successful because people are curious and like to click on things. Learn how to protect your users from phishing attacks.
