Blog

28th August 2025
What is jailbreaking?
How can removing software restrictions leave devices as security liabilities?Sometimes, as frustrating as certain rules can be, they are there for good reason. Take speed limits:…

26th August 2025
What are Intrusion Detection Systems?
Like a security camera for your digital world, how could an intrusion detection system (IDS) help to keep you protected?We all have our own version of a security system for our…

21st August 2025
What is the UK Online Safety Act (and what are the cyber security implications)?
New regulations are designed to protect children from adult content: but could these methods pose a security risk?In the last few weeks, the UK government began to enforce a set…

15th August 2025
Secrets spilt: the Tea app leaks
An app designed to make dating safer for women may have just put them at risk: how did the breach happen?The Tea app, based in the US, was created in 2023 with the goal of…

13th August 2025
How can online gaming be a target for cyber criminals? (Part 2)
Gaming can be a lucrative target for bad actors: make sure you’re not the one being played.We’re back with part two of our list – if you’d like to read part one first, you can…

11th August 2025
How can online gaming be a target for cyber criminals? (Part 1)
Level up your knowledge so you can be better protected the new time you play online games.When I use the word “gaming,” here, I am referring to digital “video” online games, which…

7th August 2025
Which Muti-Factor Authentication (MFA) method is best?
With passwords alone unreliable, how can another step ensure added security (and which method is best)?It is becoming increasingly apparent that passwords are not a reliable…

5th August 2025
What industries are most targeted by cyber-attacks?
Although anyone can become a victim of cyber-crime, there are certain professions that come under threat more often – is your workplace at high risk?As we’re so fond of repeating,…

1st August 2025
What have we learnt from some of the biggest data breaches ever recorded?
How can we learn from the mistakes of others to improve cyber security measures?Over the years, there have been many cyber security breaches that have made the news, usually…