Skip to main content

Blog

26th February 2025

What is encryption?

In 2023 the Home Office released a statement on the crucial role encryption plays in “protecting personal data, privacy, intellectual property, trade secrets and cyber…

24th February 2025

Do I need a cyber security audit?

The National Audit Office created a report on the UK government’s resilience to cyber-attacks* – shouldn’t you be as thorough with your vulnerable systems?You may think your cyber…

20th February 2025

What is sandboxing?

The Department for Science, Innovation and Technology (DSIT) and Department for Digital, Culture, Media & Sport (DCMS) published a document on the usefulness of sandboxes for…

18th February 2025

What are firewalls?

75% of businesses have implemented firewalls on their networks* – are you one of them?To understand what a firewall is, I am first going to define the two words that firewall…

14th February 2025

What is a Trojan?

Trojans make up 58% of all computer malware* – users are constantly under siege.A Trojan is a type of malware that disguises itself as a legitimate or harmless piece of software,…

12th February 2025

What are viruses and worms?

One worm caused estimated losses of $4 billion* – are you protected?When you think of worms and viruses you may think of infection and sickness. In this case though, it isn’t a…

10th February 2025

What is spyware?

86% of adults either only know spyware by name or were completely unaware of it* – just how stealthy is this form of malware?Do you ever feel like someone is watching you? Looking…

6th February 2025

What is ransomware?

Every minute, four companies fall victim* to ransomware attacks.When you think of the word ‘ransom,’ you might think of people being kidnapped or valuable art being stolen, only…

4th February 2025

What is adware?

Unwanted software and adware account for 50% of mobile malware deliveries.*At some point most of us will have been browsing a website and only to be overwhelmed by pop-up ads. It…

Back to top