Skip to main content

Blog

Eyes watching

12th September 2024

Hide & Seek

By default Windows hides certain files from being seen with Windows Explorer or My Computer. This is done to protect these files, which are usually system files, from accidentally…

Map of the world highlighting China

6th September 2024

APT40 (Advanced Persistent Threat 40)

The UK, along with its international allies, has released a new alert shedding light on how China state-sponsored actors have advanced their cyber attack techniques.The National…

Control room

4th September 2024

What are SOC Services (& Do You Need them)?

Security Operations Centre (SOC) Services play a critical role in protecting organisations from malicious cyber actors, who could threaten their security and safety (be it…

Image of NCSC web page

29th August 2024

Free Cyber Action Plan from the NCSC

The NCSC (National Cyber Security Centre) is a great source of free information for small organisations and home technology. Just answer a few simple questions to get a free…

Lion

8th August 2024

ShinyHunter Hackers

Ticketmaster, one of the largest online ticket sale platforms in the world, was successfully hacked at the end of last month. This hack is one of the biggest in history in terms…

Text saying you have been hacked

27th June 2024

The changing landscape of cyber threat

If you thought that you were on top of your IT security, think again! Your endpoint (Desktop, laptop, etc.) protection may be in good shape but this has only driven malicious…

Image of a data centre

15th May 2024

Does your business use Chat AI?

20% of organisations admit that an employee at their organisation has exposed sensitive company information using AI tools such as ChatGPT, according to new research.Where is the…

Passwords

15th February 2024

Protect Yourself!

Users can play a significant role in preventing cyber hacking incidents by adopting good cybersecurity practices. While it is impossible to eliminate all cyber threats entirely,…

Passwords

1st December 2023

Passwords

It’s been claimed that over 80% of hacking-related breaches are due to weak or stolen passwords, so it seems that it would be very easy to dramatically improve security. In…

Back to top