Blog

27th June 2025
Threat intelligence
The more knowledge you have about cyber-attacks, the better your chance of avoiding them.You can’t predict exactly when a cyber attack will occur, or exactly what type of attack…

27th June 2025
A ransomware reminder
In 2025 the number of ransomware attacks has increased by 125% globally* – is your business prepared?With high-profile attacks on retailers leading to extortionate ransoms, we…

27th June 2025
What is more secure, cloud servers or traditional servers?
While cloud seems to be the future of computing, could it be putting your systems at greater risk?Recently, more and more people have been transitioning elements of their IT to…

26th June 2025
Two-factor authentication: is it secure?
While the National Cyber Security Centre* are still encouraging individuals and businesses to use it, is two-factor authentication (2FA) truly secure?In the past few years,…

24th June 2025
Phishing emails: what to look for
3.4 billion phishing emails* are sent each day: do you know how to spot them?Phishing continues to be one of the biggest challenges in cyber security. It doesn’t matter how…

20th June 2025
Why do we fall for phishing attacks?
In a recent report 92% of businesses* admitted to falling victim to phishing attacks: how can you and your colleagues ensure that you won’t be manipulated?Although phishing…

18th June 2025
What technical methods can you use to counteract phishing attempts?
Beyond training and awareness, what steps can you take to ensure your IT is as protected from phishing attempts as it can be?While all methods of cyber-attack are wrong, as a…

16th June 2025
What methods can cyber criminals use to carry out phishing attacks?
91% of phishing attempts are made via email,* but what other methods can cyber criminals use to infiltrate your systems?Phishing attacks continue to be one of the greatest cyber…

12th June 2025
Are passkeys replacing passwords?
Through social engineering, phishing, or other malicious methods, passwords can be easily obtained: is there a better way to log in to applications securely?Passwords are the…