Blog
The most secure web browsers: A balanced overview
Web browsers are the gateway to us getting online, but which one is the right one to use? We look at the safety and privacy of some of the main players.
Navigating the waters of cyber insurance: A comprehensive guide
The terms ‘cyber’ and ‘insurance’ invoke negative thoughts, but the reality is that the threats to your business are real. Our blog will help you understand what cyber insurance is, what it covers and more.
Are on-premise servers a dying breed? An analysis of modern computing alternatives
The trend is to move away from on-premise servers. So has their time been and gone, or is there still reasons to keep them?
VPN vs. DNS filtering
As the parameters of the traditional office boundaries blur, securing the broader virtual workspace has become a concern. Read how VPN and DNS filtering can help calm those worries.
Staying secure while working from home: The importance of using a VPN
The need for high level online security is vital for any business, but are your remote workers being overlooked? Do they have the correct level of cyber security they need?
Simplify and strengthen your online security with a password manager
Passwords… we all hate them. But we can make life more simple and stress free by using a password manager. Here's what you need to know on the subject...
The crucial need for data backup: Safeguarding your business's vital assets
In this article, we explore what data backup is, why it's important, what needs backing up, and how to effectively implement a backup strategy.
How to choose the right MFA solution for your business
Looking to implement MFA in your business? In this article you'll learn about different types of MFA, what to consider when implementing it, and how to choose the right one for your business.
Dangerous online behaviour among young people
If you employ young people, be aware of the worrying online behaviour and attitudes that have become normalised for them.
5 Ways to strengthen data privacy at work
Here's a few eye-opening stats and ways to improve your data privacy.
Don't be lazy... It's time to switch on MFA
We look at what Business Email Compromise (BEC) is and a simple change you can make to help prevent your business being subject to a BEC attack.
Deepfakes - An increasing threat
What is a deepfake, what are the dangers and how do you defend yourself and your business from them?
Guides
2025 Guide to Good Cyber Security
What's in the guide?
- How to spot risks
- 12 actionable steps to stay secure
- What to do after an attack
- Expert advice from cyber security pros
The CrowdStrike Outage Explained
Download our free guide which summarises everything you need to know about the recent CrowdStrike outage including the impact on business.
A Guide to Cyber Essentials Certification
Being Cyber Essentials Certified is your shield against cyber threats, enhancing your business's resilience. Our guide is a comprehensive tool to navigate its intricacies, ensuring your digital fortress is robust.