Blog

1st May 2025
SIEM: the key to better security is in your data
How can SIEM systems utilise your business’ data to identify cyber-attacks?In 2025, data is more important than ever. It can be used to help us identify patterns and trends,…

29th April 2025
Why is cyber security training so important?
Learning more about your cyber security could save your business – find out how.When we recommend that clients undergo cyber security training, we get a familiar response:“I don’t…

25th April 2025
Which web browser is the most secure?
Web browsers are a useful tool that most of us use every day, but which one provides the best cyber security? We’re going to rank the top 5 most used web browsers, breaking down…

23rd April 2025
How can using your personal devices at work be a potential security risk?
The biggest threat to your businesses cyber security could be YOU!Many of us end up using our personal devices as part of our work. Personally, I use my phone to keep up with…

17th April 2025
What are the top 10 cyber security trends to watch in 2025?
Cyber security is constantly evolving and changing – with every update comes more opportunity for cyber criminals to exploit vulnerabilities and a greater need to defend against…

15th April 2025
Mixed Signals – the White House group chat incident
What errors in cyber security resilience were made that allowed government secrets to leak and how could more of a focus on cyber security training prevent it from happening…

11th April 2025
How can cyber crimes pose a physical real-world threat to you?
Cyber crime has the potential to be just as deadly as physical, in-person crimes: don’t think you’re safe behind a screen.If I was to tell you that you were at risk of becoming a…

9th April 2025
What is a zero-day exploit?
The result of constant innovation is that hackers could exploit unknown weaknesses in new technology and updates: how can consumers stay ahead of bad actors when technology…

7th April 2025
What is penetration testing?
Sometimes, the best way to combat cyber-criminals is to think like a cyber-criminal!Imagine you’re putting up a tent. You follow the instructions (or wing it, as the case may be),…