Blog

21st October 2025
How can your IP address be a cyber security vulnerability?
Your Internet Protocol (IP) address can be used to attack your systems – how, and what can you do to defend yourself.A unique identifier assigned to every device on a network, an…

17th October 2025
Free cyber security tools (that even IT amateurs can use)
Cyber security isn’t cheap: what resources are available to you even if you are on a budget?If you want great cyber security, your best bet is to have a team at the ready,…

15th October 2025
Critical infrastructure: what is it and why do cyber criminals target it?
Some cyber threats are greater than others: how can a cyber attack become a national threat?As technology has evolved, we have naturally included it in our important…

13th October 2025
What is mobile malware?
These malware attacks are designed to target your phone – are you prepared, or do you need to give a security provider a call?Most of us in the modern world use smartphones in our…

9th October 2025
What is fileless malware?
A type of malware that can cause havoc on your systems without leaving a trace: are you prepared to defend against it?Malware is constantly changing and evolving – bad actors make…

7th October 2025
What is a rootkit?
Hard to detect and potentially very dangerous, are you prepared to counteract this type of malware?Malware based attacks, particularly those coming from phishing emails, are…

2nd October 2025
What is SQL injection?
How could your systems be tricked into executing unintended commands?To understand how this attack works, first we need to understand how SQL works. SQL, or Structured Query…

1st October 2025
What is cross-site scripting (XSS)?
How could you be infected with malicious code and not even know it?Cross-site scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts into web pages…

29th September 2025
What is a man-in-the-middle attack?
Could cyber criminals be intercepting your communications?A man-in-the-middle (MitM) attack refers to when a bad actor secretly intercepts or alters communications between two…