Blog
12th September 2024
Hide & Seek
By default Windows hides certain files from being seen with Windows Explorer or My Computer. This is done to protect these files, which are usually system files, from accidentally…
6th September 2024
APT40 (Advanced Persistent Threat 40)
The UK, along with its international allies, has released a new alert shedding light on how China state-sponsored actors have advanced their cyber attack techniques.The National…
4th September 2024
What are SOC Services (& Do You Need them)?
Security Operations Centre (SOC) Services play a critical role in protecting organisations from malicious cyber actors, who could threaten their security and safety (be it…
29th August 2024
Free Cyber Action Plan from the NCSC
The NCSC (National Cyber Security Centre) is a great source of free information for small organisations and home technology. Just answer a few simple questions to get a free…
8th August 2024
ShinyHunter Hackers
Ticketmaster, one of the largest online ticket sale platforms in the world, was successfully hacked at the end of last month. This hack is one of the biggest in history in terms…
27th June 2024
The changing landscape of cyber threat
If you thought that you were on top of your IT security, think again! Your endpoint (Desktop, laptop, etc.) protection may be in good shape but this has only driven malicious…
15th May 2024
Does your business use Chat AI?
20% of organisations admit that an employee at their organisation has exposed sensitive company information using AI tools such as ChatGPT, according to new research.Where is the…
15th February 2024
Protect Yourself!
Users can play a significant role in preventing cyber hacking incidents by adopting good cybersecurity practices. While it is impossible to eliminate all cyber threats entirely,…
1st December 2023
Passwords
It’s been claimed that over 80% of hacking-related breaches are due to weak or stolen passwords, so it seems that it would be very easy to dramatically improve security. In…