Skip to main content

Blog

23rd October 2025

Phishing attacks: are they getting smarter?

As social engineering evolves, we have to be ready to improve our defences.By now, most people should be aware of phishing – and if you’re not, look at some of our other articles,…

21st October 2025

How can your IP address be a cyber security vulnerability?

Your Internet Protocol (IP) address can be used to attack your systems – how, and what can you do to defend yourself.A unique identifier assigned to every device on a network, an…

17th October 2025

Free cyber security tools (that even IT amateurs can use)

Cyber security isn’t cheap: what resources are available to you even if you are on a budget?If you want great cyber security, your best bet is to have a team at the ready,…

15th October 2025

Critical infrastructure: what is it and why do cyber criminals target it?

Some cyber threats are greater than others: how can a cyber attack become a national threat?As technology has evolved, we have naturally included it in our important…

13th October 2025

What is mobile malware?

These malware attacks are designed to target your phone – are you prepared, or do you need to give a security provider a call?Most of us in the modern world use smartphones in our…

9th October 2025

What is fileless malware?

A type of malware that can cause havoc on your systems without leaving a trace: are you prepared to defend against it?Malware is constantly changing and evolving – bad actors make…

7th October 2025

What is a rootkit?

Hard to detect and potentially very dangerous, are you prepared to counteract this type of malware?Malware based attacks, particularly those coming from phishing emails, are…

2nd October 2025

What is SQL injection?

How could your systems be tricked into executing unintended commands?To understand how this attack works, first we need to understand how SQL works. SQL, or Structured Query…

1st October 2025

What is cross-site scripting (XSS)?

How could you be infected with malicious code and not even know it?Cross-site scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts into web pages…

Back to top