Using Multi Factor Authentication

Don't be lazy... It's time to switch on MFA

We look at what Business Email Compromise (BEC) is and a simple change you can make to help prevent your business being subject to a BEC attack.
November 02, 2022 — Paul Stanyer
Laptop being used with hovering padlock icons depicting security

Protecting your business against phishing attacks [2022 UPDATED]

This article will help by providing some answers to these questions: What is a phishing attack? How does a phishing attack work? Who are vulnerable to phishing attacks? How can I tell a phishing email from a genuine one? How can I protect myself and my business from a phishing attack?
March 17, 2022 — Paul Stanyer
Hacker using computer

How hackers are using phishing in ransomware attacks

Don’t push the red button! - Phishing attacks are regularly successful because people are curious and like to click on things. Learn how to protect your users from phishing attacks.
October 14, 2021 — Paul Stanyer