MFA Isn’t Bulletproof: How to Protect Your Microsoft 365 Data from Session Hijacking

MFA Isn’t Bulletproof: How to Protect Your Microsoft 365 Data from Session Hijacking

A growing threat called session hijacking is bypassing MFA entirely, and it's already being used to target Microsoft 365, Microsoft personal accounts and Google accounts like yours. Here's what you need to know.

August 01, 2025 — Paul Stanyer
What is the Principle of Least Privilege (PoLP) and How Can Your Business Benefit?

What is the Principle of Least Privilege (PoLP) and How Can Your Business Benefit?

Discover how the Principle of Least Privilege (PoLP) can protect your business from cyber threats, reduce human error, and streamline operations — all by giving people access to only what they need. A simple change that makes a big difference.

July 08, 2025 — Paul Stanyer
Public Wi-Fi: Great for Coffee, Terrible for Cyber Security

Public Wi-Fi: Great for Coffee, Terrible for Cyber Security

Public Wi-Fi might be convenient, but it’s also a playground for cyber criminals. We break down the risks and share simple steps to keep your business data safe while you're on the go.

June 09, 2025 — Paul Stanyer
7 Ways Hackers Can Break Into Your Accounts (And How to Stop Them)

7 Ways Hackers Can Break Into Your Accounts (And How to Stop Them)

In this guide, we’ll lift the lid on seven lesser-known hacking tactics you should be aware of, and what you can do to stay one step ahead.

May 26, 2025 — Paul Stanyer
Should You Be Concerned About the Rise in Cyber Attacks? – Here’s What You Need to Know

Should You Be Concerned About the Rise in Cyber Attacks? – Here’s What You Need to Know

The news surrounding the recent cyber attacks on M&S, Co-op and Harrods, could lead you to thinking that its only big businesses affected by these sort of incidents. Sadly this just isn't the case. Here's what you need to know.

How to Build a Solid Business Recovery Plan

How to Build a Solid Business Recovery Plan

Businesses that bounce back quickly after an incident have one thing in common - they had a plan. We explain whats needed to build a solid business recovery plan. We've even created a free checklist for you to download.

April 29, 2025 — Paul Stanyer
The Caution Needed When Using AI in the Workplace

The Caution Needed When Using AI in the Workplace

Some of the news we hear about AI is positive, and some negative. We know for sure that it's not perfect, so sensible steps should be taken to use it safely within your business. We explore some of the concerns and caution needed when using AI.

February 17, 2025 — Paul Stanyer
The True Cost of Downtime: What Every Business Needs to Know

The True Cost of Downtime: What Every Business Needs to Know

Downtime is an inevitable challenge, and can be caused for various reasons. We talk about the impact, how you can calculate your downtime cost and how you can build resilience.

February 03, 2025 — Kevin Turner
How to Spot a Phishing Email

How to Spot a Phishing Email

With over 85% of successful data breaches or cyber attacks beginning with a phishing email, it's so important to know how to identify one. We'll show you how.

January 21, 2025 — Paul Stanyer
Stay Cyber-Safe This Holiday Season: Essential Cyber Security Tips for Your Business

Stay Cyber-Safe This Holiday Season: Essential Cyber Security Tips for Your Business

The holiday season is a time of increased online activity with shopping deals and end of year communications galore. This makes it a prime time for cyber criminals. To lessen the chances of succumbing to these attacks, we've put together a blog with reminders of dangers to look out for. Not only that but we've put it into a downloadable PDF that you can print out and make visible around the office. Stay safe this holiday season.
November 22, 2024 — Paul Stanyer
6 Essential Steps to Strengthen Your Email Security

6 Essential Steps to Strengthen Your Email Security

A secure inbox doesn’t just protect you; it also safeguards sensitive information and helps maintain the integrity of your communications. Here’s a simple, step-by-step guide to help fortify your email security.
November 05, 2024 — Paul Stanyer
Recent ransomware scam disguised as well-known and trusted UK postal service

Recent ransomware scam disguised as well-known and trusted UK postal service

Researchers at Cyber Security firm Proofpoint identified an email campaign in September 2024 impersonating the UK postal service, Royal Mail. 
October 09, 2024 — Paul Stanyer