Blog

25th October 2024
Cyber Attack - What To Do
We often receive malicious emails from a contact that has been compromised – fortunately, we have impenetrable security systems that block these and render them harmless. If you…

17th October 2024
Cyber security and ISO 27001 compliance
I am sure that no one will have missed the ISO logo’s that seem to pop up everywhere now. A standard which must surely apply to everyone and which can only become more essential…
.jpg/2e00d47f1ca1e284c9ca8f05395ceba7.jpg?id=1728649350)
11th October 2024
The Importance of Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA) is like locking your front door or car – you’d be mad not to do it! MFA is a (simple) security measure that requires users to present two or more…

7th October 2024
Hug a Hacker?
Maybe not but it might be useful to get to know your would-be hacker. A hacker is very easy to identify if you met them face to face because, apparently, they always wear a dark…

26th September 2024
SoHo (small-office and home-office) Protection
The UK has previously identified APT40 (Advanced Persistent Threat 40) as part of the Chinese Ministry of State Security and it is this cyber threat group that is now targeting…

20th September 2024
Five Eyes look East
The UK and its Five Eyes allies (Australia, Canada, New Zealand, and the US) have issued a cyber attack warning over a China-backed "botnet" of more than 260,000…

17th September 2024
InterGuard
You may have read my recent article about SOC services ... What are SOC Services (& Do You Need them)?SOC Services (Security Operations Centre) are emerging as a Must Have for…

12th September 2024
Hide & Seek
By default Windows hides certain files from being seen with Windows Explorer or My Computer. This is done to protect these files, which are usually system files, from accidentally…

6th September 2024
APT40 (Advanced Persistent Threat 40)
The UK, along with its international allies, has released a new alert shedding light on how China state-sponsored actors have advanced their cyber attack techniques.The National…