Blog

4th February 2025
What is adware?
Unwanted software and adware account for 50% of mobile malware deliveries.*At some point most of us will have been browsing a website and only to be overwhelmed by pop-up ads. It…

31st January 2025
What is malware?
560,000 new pieces of malware are detected each day* – how can cyber security keep up?If you’re like me, you’ve heard the term ‘malware’ before, and you might have some vague idea…

30th January 2025
DeepSeek: revolutionary AI tool or potential security risk?
Seemingly out of nowhere, DeepSeek has launched the AI landscape into a new era: what is it, why is it popular and can you trust it with your data?DeepSeek is a free AI powered…

29th January 2025
What makes the best password?
The National Cyber Security Centre (NCSC) found that 23.2 million victims of cybercrime used the password '123456'* - surely we can do better than that?Passwords can be…

29th January 2025
How are attackers using Teams and Outlook to breach your security?
Recently, IT security company Sophos published a report* revealing that two different groups of cyber criminals abused Microsoft 365 policy to infiltrate devices, aiming to steal…

28th January 2025
What is a SOC? The heart of your cyber security
The global increase in cybercrime has resulted in a greater demand for SOC services.*You may have found them mentioned in paperwork; perhaps you have been advised to establish…

31st October 2024
Cyber security breaches in 23/24
The Department for Science, Innovation & Technology published a report earlier this year showing the cyber security breaches in 23/24:1. Incidence of Cyber Breaches and…

28th October 2024
Gone Phishing ...
According to the National Cyber Security Centre (NCSC) phishing makes up more than 8 in 10 cyber attacks against UK small businesses.Everyone must now be familiar with phishing…

25th October 2024
Cyber Attack - What To Do
We often receive malicious emails from a contact that has been compromised – fortunately, we have impenetrable security systems that block these and render them harmless. If you…