IT In The News
The latest in cyber security

Summer Holidays: A Time When Cybersecurity Takes a Backseat, Spear Phishing and AI Impersonation on the Rise
As the summer sun casts its warm glow, people around the world eagerly prepare for their well-deserved holidays. The joyous atmosphere, coupled with a sense

The Impact of Economic Downturns on Cybersecurity: Navigating the Challenges
Economic downturns cast a shadow of uncertainty over various aspects of our lives, and one area profoundly affected is cybersecurity. In this blog post, we

The Comical Quest for Security in a World Gone Defunct
Picture this: you’re sitting at your computer, trying to come up with yet another password that meets all the security requirements. It needs to be

The Perils of Out-of-Date Computers and Servers: Unveiling the Impact on Cyber Security
In our increasingly interconnected world, where digital data reigns supreme, cybersecurity has become a paramount concern for individuals, businesses, and governments alike. While cybersecurity strategies

Unleashing the Dark Side: How Cybercriminals Exploit AI to Infiltrate Companies
The landscape of cybercrime is ever-evolving, and as technology advances, so do the tactics employed by malicious actors. In recent years, cybercriminals have harnessed the

What can I do to improve my Cyber Security Posture quickly?
As cyber threats continue to evolve and become more sophisticated, it’s becoming increasingly important for businesses to prioritize their cybersecurity efforts. However, many companies are

Safeguarding Digital Assets
In the era of digital transformation, businesses and individuals are increasingly reliant on digital systems and online platforms for communication, collaboration, and data storage. With

Why SMEs Should Use Specialist Cybersecurity Companies
In today’s digital landscape, small and medium-sized enterprises (SMEs) are increasingly becoming targets for cybercriminals. Despite their size, SMEs possess valuable data and resources that

Small-time cybercrime is about to explode — We aren’t ready
The cybersecurity industry tends to focus on extremely large-scale or sophisticated, state-sponsored attacks. Rightfully so, as it can be the most interesting, technically speaking. When

8 Tips for Securing Networks When Time Is Scarce by Rapid7
Recently, CISA released their Shields Up guidance around reducing the likelihood and impact of a cyber intrusion in response to increased risk around the Russia-Ukraine

CIS Security and Benchmarking
The Centre for Internet Security The Center for Internet Security (CIS) benchmarks are a set of best-practice cybersecurity standards for a range of IT systems

14 Principles of Cloud Security
The procedures and technology that secure cloud computing environments against both external and insider cybersecurity threats are known as Cloud Security. The unprecedented adoption of

How do I stop my employees clicking on a spoof email?
Cybercrime pays and it pays organised crime a lot! More than ever, your users are the weakest link in your network security. Training will help

7 Tips to Reduce your Digital Risk
1. Get up to date Number one on your list is to make sure that all your systems and applications are up to date. For

Network and Network Security Assessments
Smart Phones, Tablets, file sharing, cloud-based apps, IOT, machine-based learning are only a few of the things that are defining how we are consuming IT.

Attack Surface Monitoring with Project Sonar
Why you should care about your expanding attack surface An attack surface in the realm of information security is the variety of ways a given asset can

Big Data and the Internet of Everything
According to a recent Cisco News article the Internet of Everything (IoE) is a multi-trillion dollar opportunity that incorporates data gathering, data processing, data analysis,

Cisco Extension Mobility
Cisco Game Changing Unified Communications Service: Cisco Extension MobilityThere are a lot of new services being developed for Unified Communications – integration with applications like

Keep Your Business Safe From Extortion Malware
Keep Your Business Safe From Extortion MalwareRansomware is malware that can lock a device or encrypt its contents in order to extort money from the

How Cyber Security is Important
As we become more connected with the proliferation of smart devices, other connected things have invaded virtually every aspect of our lives. Almost everything we

‘Nearly half’ of firms had a cyber-attack or breach
Nearly half (46%) of British businesses discovered at least one cybersecurity breach or attack in the past year, a government survey has indicated. That proportion

Enhancing Microsoft Office 365 Security
Enhancing Microsoft Office 365 Security – What You Need to KnowThe attraction of Office 365 is clear. Why set up your own Exchange Server, or

The Rise of Android Ransomware
Ransomware is a growing problem for users of mobile devices. Lockscreen types and file-encrypting “crypto-ransomware”, both of which have been causing major financial and data

Threat Defence Made Simple | Sophos
Next-Generation Advanced Threat Defence Made SimpleSophos leads the security industry in fighting advanced malware using highly effective technologies such as real-time JavaScript emulation and behavioural