Using a biometric authentication method

How to choose the right MFA solution for your business

Looking to implement MFA in your business? In this article you'll learn about different types of MFA, what to consider when implementing it, and how to choose the right one for your business.
March 17, 2023 — Paul Stanyer
Teens using mobiles

Dangerous online behaviour among young people

If you employ young people, be aware of the worrying online behaviour and attitudes that have become normalised for them.
February 07, 2023 — Paul Stanyer
5 Ways to strengthen data privacy at work

5 Ways to strengthen data privacy at work

Here's a few eye-opening stats and ways to improve your data privacy.
January 25, 2023 — Paul Stanyer
shopping online on a mobile device

Stay safe this holiday season

Don't let your guard down this holiday season. Watch out for these scams.
December 01, 2022 — Paul Stanyer
Using Multi Factor Authentication

Don't be lazy... It's time to switch on MFA

We look at what Business Email Compromise (BEC) is and a simple change you can make to help prevent your business being subject to a BEC attack.
November 02, 2022 — Paul Stanyer
Deepfakes - An increasing threat

Deepfakes - An increasing threat

What is a deepfake, what are the dangers and how do you defend yourself and your business from them?
October 19, 2022 — Paul Stanyer
illustration of a hybrid working environment

Does your business have the right cyber security for hybrid working?

Many businesses still haven't got the correct cyber security measures in place for hybrid working environments? Is yours one of them?
July 19, 2022 — Paul Stanyer
Close up of the face of an ethical hacker with reflection of computer screen on his lenses

What is penetration testing and how does it work?

What is it, how does it work and does my business really need one?
July 14, 2022 — Paul Stanyer
Are shared user accounts a good idea?

Are shared user accounts a good idea?

We look at the pros and cons of shared user accounts and things you need to be aware of.
June 07, 2022 — Paul Stanyer
Microsoft Office

Follina security vulnerability actively exploited in Microsoft Office

The Follina security vulnerability is the latest to affect Microsoft Office customers. What can you do to protect yourself and your staff? Here's what to do...
June 03, 2022 — Paul Stanyer
Laptop being used with hovering padlock icons depicting security

Protecting your business against phishing attacks [2022 UPDATED]

This article will help by providing some answers to these questions: What is a phishing attack? How does a phishing attack work? Who are vulnerable to phishing attacks? How can I tell a phishing email from a genuine one? How can I protect myself and my business from a phishing attack?
March 17, 2022 — Paul Stanyer
Businessman typing on his laptop

Government advice - Tighten your security now

In light of what’s happening with Russia and Ukraine, advice from the National Cyber Security Centre is urging ‘organisations in the UK to bolster their online defences’ against cyber-attacks. Although...
March 09, 2022 — Paul Stanyer