encryption illustration

VPN vs. DNS filtering

As the parameters of the traditional office boundaries blur, securing the broader virtual workspace has become a concern. Read how VPN and DNS filtering can help calm those worries.
July 19, 2023 — Paul Stanyer
Staying secure while working from home: The importance of using a VPN

Staying secure while working from home: The importance of using a VPN

The need for high level online security is vital for any business, but are your remote workers being overlooked? Do they have the correct level of cyber security they need?
June 20, 2023 — Paul Stanyer
Someone typing their password into a computer

Simplify and strengthen your online security with a password manager

Passwords… we all hate them. But we can make life more simple and stress free by using a password manager. Here's what you need to know on the subject...
June 08, 2023 — Paul Stanyer
Data room

The crucial need for data backup: Safeguarding your business's vital assets

In this article, we explore what data backup is, why it's important, what needs backing up, and how to effectively implement a backup strategy.
May 25, 2023 — Paul Stanyer
Using a biometric authentication method

How to choose the right MFA solution for your business

Looking to implement MFA in your business? In this article you'll learn about different types of MFA, what to consider when implementing it, and how to choose the right one for your business.
March 17, 2023 — Paul Stanyer
Teens using mobiles

Dangerous online behaviour among young people

If you employ young people, be aware of the worrying online behaviour and attitudes that have become normalised for them.
February 07, 2023 — Paul Stanyer
5 Ways to strengthen data privacy at work

5 Ways to strengthen data privacy at work

Here's a few eye-opening stats and ways to improve your data privacy.
January 25, 2023 — Paul Stanyer
Using Multi Factor Authentication

Don't be lazy... It's time to switch on MFA

We look at what Business Email Compromise (BEC) is and a simple change you can make to help prevent your business being subject to a BEC attack.
November 02, 2022 — Paul Stanyer
Deepfakes - An increasing threat

Deepfakes - An increasing threat

What is a deepfake, what are the dangers and how do you defend yourself and your business from them?
October 19, 2022 — Paul Stanyer
Close up of the face of an ethical hacker with reflection of computer screen on his lenses

What is penetration testing and how does it work?

What is it, how does it work and does my business really need one?
July 14, 2022 — Paul Stanyer
Are shared user accounts a good idea?

Are shared user accounts a good idea?

We look at the pros and cons of shared user accounts and things you need to be aware of.
June 07, 2022 — Paul Stanyer
Businessman typing on his laptop

Government advice - Tighten your security now

In light of what’s happening with Russia and Ukraine, advice from the National Cyber Security Centre is urging ‘organisations in the UK to bolster their online defences’ against cyber-attacks. Although...
March 09, 2022 — Paul Stanyer