Skip to main content

Blog

12th March 2025

How can AI be used to create malware?

Artificial intelligence (AI) is advancing technological capabilities by automating processes, expanding existing abilities and improving efficiency, all in a user-friendly way.As…

7th March 2025

What is social engineering and how does AI impact it?

Social engineering is the process that cyber criminals use to manipulate you into giving away your secure data. They trick victims into thinking they are trustworthy, stealing…

6th March 2025

Machine learning: what are the security risks?

Machine learning uses data to learn, so what can cyber criminals learn from them?Machine learning (ML) is a key factor of artificial intelligence (AI). ML is the process of…

4th March 2025

How are AI deepfakes becoming a cyber security threat?

Can you trust what you see on screen?I’m sure you have witnessed in the last month the continuing meltdown of the man formerly known as Kayne West: don’t worry, we’re not…

28th February 2025

EDR and XDR – what are they?

Malware based threats surged by 30% in 2024 compared with the same period in 2023*. Cyber-crime is increasing: are your defences ready for what may come in 2025?The world of cyber…

26th February 2025

What is encryption?

In 2023 the Home Office released a statement on the crucial role encryption plays in “protecting personal data, privacy, intellectual property, trade secrets and cyber…

24th February 2025

Do I need a cyber security audit?

The National Audit Office created a report on the UK government’s resilience to cyber-attacks* – shouldn’t you be as thorough with your vulnerable systems?You may think your cyber…

20th February 2025

What is sandboxing?

The Department for Science, Innovation and Technology (DSIT) and Department for Digital, Culture, Media & Sport (DCMS) published a document on the usefulness of sandboxes for…

18th February 2025

What are firewalls?

75% of businesses have implemented firewalls on their networks* – are you one of them?To understand what a firewall is, I am first going to define the two words that firewall…

Back to top