How iOS 16 affects your security
Apple released its iOS 16 update last week, offering users plenty of lock-screen customisation and the ability to unsend messages and emails. However, the most
Apple released its iOS 16 update last week, offering users plenty of lock-screen customisation and the ability to unsend messages and emails. However, the most
Our Cyber Essentials checklist is the perfect tool to make sure you and your organisation are well-prepared for the CE assessment.
Hackers have used the opportunity offered by NASA’s new James Webb telescope to try and spread some malware
Read about our penetration testers when they went to Def Con, the world’s biggest hacking convention, for the first time in August
In the evolving world of cyber-security, supply-chain attacks are a proven threat that need to be examined.
It is vital to choose a cybersecurity company that is accredited to an internationally recognised organisation with the proper credentials, to attain adequate protection and
Having secure online systems is essential for your company’s cyber security. One of the most effective methods of ensuring high levels of cyber security is
Everything you need to know about penetration testing, a crucial part of any business’ cybersecurity defences
Linkedin Author: Stephen Fowler, Director of Technologies Stephen writes about the human element in Cyber security. If you would like to talk about your own
Data protection is fundamental to safeguarding critical information. Here we look at the data that needs protecting, how to fulfil your GDPR obligations and the
Social engineering is a threat to all businesses and organisations, no matter how large or small. With one in three data breaches involving social engineering, it is vital for your business to understand what social engineering is and the tactics used by criminals.
Most businesses and organisations operate online or use applications to conduct businesses, interact with clients or provide a service. The infrastructure that supports these operations
Passwords are a balancing act for anyone who uses the internet via their computer or phone. A complex password offers excellent security but is hard
Any device that connects to the internet could be vulnerable to cybersecurity threats. In this article, we go through the most crucial steps to prevent
Despite the educational sector lacking staffing, resources, and funding, it remains a target for cybercriminals. The reality is, each year it is becoming more common to hear of educational institutions being hit by cyber-attacks.