Blog Posts About Security

Explore our latest blog posts about Security from the PS Tech team.

Legacy Debt Audit: The Three Oldest Risks Worth Finding First

Legacy Debt Audit: The Three Oldest Risks Worth Finding First

Legacy debt can quietly increase security, compliance and downtime risk. Learn which ageing systems to audit first and how to turn hidden IT risk into a practical action plan.

Email Scanning Service: How to Tell If AI Wrote An Email

Email Scanning Service: How to Tell If AI Wrote An Email

Learn how AI-written emails are changing phishing risks, and how a reliable email scanning service helps businesses check trust, context, links and sender behaviour.

April 24, 2026
Is security part of how your business runs, or an added on later?

Is security part of how your business runs, or an added on later?

Security issues often build quietly over time. Learn how to tell if your security is something thats been added on rather than part of your process, and where a technology performance review can help.

April 20, 2026
Why IT Offboarding Is a Critical Security Control

Why IT Offboarding Is a Critical Security Control

Employee offboarding is a critical security control. Learn how a structured IT offboarding process protects data, reduces compliance risk, and prevents costly SaaS sprawl.

March 02, 2026
How vulnerable is my business to cyber attacks right now?

How vulnerable is my business to cyber attacks right now?

Instead of trying to provide a definitive answer, we explore what increases vulnerability, what actively reduces it, and how businesses can move in the right direction.

Data Privacy Beyond Compliance

Data Privacy Beyond Compliance

Data Privacy Week is a reminder that protecting personal and organisational data is about trust, responsibility and reducing everyday risk. Explore why data privacy still matters and the practical steps organisations can revisit now.

5 Ways Businesses Can Get IT Asset Disposal Right

5 Ways Businesses Can Get IT Asset Disposal Right

How businesses can manage IT asset disposal safely, protect sensitive data, and meet compliance obligations when retiring old hardware.

January 19, 2026
The Smarter Way to Vet Your SaaS Integrations

The Smarter Way to Vet Your SaaS Integrations

Learn how to vet SaaS integrations properly with a practical, security-focused approach that reduces third-party risk and protects your data.

January 12, 2026
Why Employees Are Turning to Unapproved AI at Work

Why Employees Are Turning to Unapproved AI at Work

Employees are using unapproved AI tools at work to save time, often without realising the risks. Learn why shadow AI is growing and how businesses can adopt AI safely with clear guidance and Microsoft 365 Copilot.

Watch out for fake apps hiding malware

Watch out for fake apps hiding malware

Fake versions of popular apps are being used to spread malware. Learn how SEO poisoning works, why these attacks are increasing, and what practical steps your team can take to stay safe.

December 15, 2025
AI Now Drives Most Malware - Here’s What That Means For Everyday Businesses

AI Now Drives Most Malware - Here’s What That Means For Everyday Businesses

Discover how automated threats are evolving, why traditional defences are struggling, and what practical steps help businesses stay ahead.

The Core 4 Cyber Security Habits

The Core 4 Cyber Security Habits

Discover the Core 4 cyber security habits that continue to protect businesses from evolving threats. Learn how AI is changing the game and how to build lasting digital safety practices.

October 31, 2025

You can always contact us