Skip to main content

Blog

22nd July 2025

How did the Covid pandemic change cyber security? (part 1)

With more people working from home, what impact did that have on cyber security and how can the repercussions still be felt today?During the years of the Covid pandemic, IT in…

18th July 2025

What is the Cyber Security and Resilience Bill (2025)?

With cyber threats constantly evolving, the UK government are set to make improvements to cyber security legislation, for greater resilience and regulation.In 2024, it was…

16th July 2025

Do you have a cyber security response plan?

If not, you need one: but how should you go about making it?Planning makes everything easier. The more prepared you are for something, the more straightforward it will be to…

14th July 2025

Why is communication essential during a cyber security incident?

If your business is attack, it is important that everyone can communicate to mitigate damage.In any aspect of life, communication with other people is essential. People don’t know…

10th July 2025

How can blockchain improve cyber security?

As cyber threats develop, we must use every technology available to improve our defences.Blockchain is something I’ve always found complicated, until I was given a simple example:…

8th July 2025

What are Advanced Persistent Threats?

Any cyber-attack can be devastating: an APT attack is worse.When people collaborate in cyber security, a lot can be achieved. If teams that monitor and detect cyber threats work…

27th June 2025

Threat intelligence

The more knowledge you have about cyber-attacks, the better your chance of avoiding them.You can’t predict exactly when a cyber attack will occur, or exactly what type of attack…

27th June 2025

A ransomware reminder

In 2025 the number of ransomware attacks has increased by 125% globally* – is your business prepared?With high-profile attacks on retailers leading to extortionate ransoms, we…

27th June 2025

What is more secure, cloud servers or traditional servers?

While cloud seems to be the future of computing, could it be putting your systems at greater risk?Recently, more and more people have been transitioning elements of their IT to…

Back to top