Skip to main content

Blog

4th February 2025

What is adware?

Unwanted software and adware account for 50% of mobile malware deliveries.*At some point most of us will have been browsing a website and only to be overwhelmed by pop-up ads. It…

31st January 2025

What is malware?

560,000 new pieces of malware are detected each day* – how can cyber security keep up?If you’re like me, you’ve heard the term ‘malware’ before, and you might have some vague idea…

30th January 2025

DeepSeek: revolutionary AI tool or potential security risk?

Seemingly out of nowhere, DeepSeek has launched the AI landscape into a new era: what is it, why is it popular and can you trust it with your data?DeepSeek is a free AI powered…

29th January 2025

What makes the best password?

The National Cyber Security Centre (NCSC) found that 23.2 million victims of cybercrime used the password '123456'* - surely we can do better than that?Passwords can be…

29th January 2025

How are attackers using Teams and Outlook to breach your security?

Recently, IT security company Sophos published a report* revealing that two different groups of cyber criminals abused Microsoft 365 policy to infiltrate devices, aiming to steal…

28th January 2025

What is a SOC? The heart of your cyber security

The global increase in cybercrime has resulted in a greater demand for SOC services.*You may have found them mentioned in paperwork; perhaps you have been advised to establish…

31st October 2024

Cyber security breaches in 23/24

The Department for Science, Innovation & Technology published a report earlier this year showing the cyber security breaches in 23/24:1. Incidence of Cyber Breaches and…

Two men fishing

28th October 2024

Gone Phishing ...

According to the National Cyber Security Centre (NCSC) phishing makes up more than 8 in 10 cyber attacks against UK small businesses.Everyone must now be familiar with phishing…

Computer with a cyber attack demand for money

25th October 2024

Cyber Attack - What To Do

We often receive malicious emails from a contact that has been compromised – fortunately, we have impenetrable security systems that block these and render them harmless. If you…

Back to top