Blog


When it comes to Security we all need 'The Eye of the Tiger'

I was lucky enough to spend a few days away with my wife last weekend, we have two small children, so this is a rare occurrence. In charge of our two little ones were my parents, for information purposes, they are 65 and 75. Both can turn on a laptop but still download free security as they claim to ...Read More >>

#guest-blog

IT Security - Email & Web Security

Email Security Email is one of your most business-critical tools, however, the range of email threats is increasing rapidly. Due to this, systems and solutions for email and web security are having to adapt and become more complex than ever, while at the same time offer advanced business functional ...Read More >>

#technologies

Back to Cybersecurity Basics – Part 10: Network Security

Gone are the days when a network was confined within the walls of your business. In 2018 organisations of all sizes are taking advantage of the rapid advances in technology to provide their employees with a more distributed, flexible working environment. This flexibility brings with it numerous b ...Read More >>

#network-security #general

Back to Cybersecurity Basics – Part 9: Malware Protection

Malware, or malicious software to give it it’s full name is any software that’s sole intention is to cause harm to a computer/network or to use its influence to extract sensitive data or money in the form of cryptocurrency. To protect yourself from Malware, you must first understand what Malw ...Read More >>

#endpoint-security #general

Back to Cybersecurity Basics – Part 8: Secure Configuration

For those of you that have gone through the Cyber Essentials scheme, like us, you will know that Secure Configuration is one of the five key controls spoken about by the UK Government in the guidelines. Configuring systems securely at the point of being developed will ensure that vulnerabilities ...Read More >>

#endpoint-security #general #risk-management