What is a human firewall and why is it important?

Businesses across all industries are constantly at risk of falling victim to a cyberattack. To reduce this risk, it is essential that businesses secure their IT systems. It is common to have several solutions working together to provide comprehensive security, for example, email, web, network, and endpoint. However, many businesses fail to invest in one […]

The role passwords play in a world of cybercrime

For businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are doing everything possible to reduce the chance of falling victim to an account compromise attack. Whilst having a strong password is a good start, there are other technologies and processes […]

What is Identity and Access Management (IAM), and why is it important?

In order for employees to work productively, it is essential that they have access to the files and tools required to do their job. With this being said, it is also possible for an employee to have too much access, which can lead to major security issues. The process of managing and authenticating user identities […]

Five reasons why your business should outsource their cybersecurity

Maintaining a strong security posture is a significant challenge for most businesses. With complex cyberattacks becoming more common, all businesses are at risk of falling victim. To reduce this risk, businesses typically implement innovative technologies that focus on prevention, detection, and remediation. However, this technology in isolation will not prevent a cyberattack, it needs to […]

How businesses can stay vigilant in periods of increased global cyber risk

Ever since the widespread adoption of the internet, there have been periods of time where businesses have faced increased cyber risk. Some examples within the last 5 years include the WannaCry ransomware attacks in 2017 and the SolarWinds malware attack in 2020. With Russian’s recent assault on Ukraine, the UK has entered another period of […]

5 Types of Phishing Attacks (and How to Avoid Them)

Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a fraudulent email, SMS, or instant message. This message is designed to deceive the victim into sharing sensitive information or clicking a link that will run malicious code. In the past year, 83% of […]

Why your business needs a disaster recovery plan

There are many risks to a business’s data including hardware malfunctions, human error, natural disaster, and ransomware. To mitigate these risks, most businesses have some form of backup solution. However, if this system is not part of a wider disaster recovery plan, businesses can experience significant downtime or loss of data. In this article we […]

Ukrainian Malware Attacks: Fake Ransomware Explained

On January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware targeting organisations within the Ukraine. The Ukraine government has indicated that they have ‘evidence’ that the cyberattack was carried out by Russian nation-state actors. Russia has since stated that it has nothing to do with the attack. Regardless of who initiated […]

Passwordless Authentication: Benefits, Challenges and Deployment Options

Poor password hygiene remains a key security weakness for many businesses. All employees know that a password should be long, complex, unique and never shared with anyone. Although this is simple in theory, in practice it can be difficult to remember a new complex password for every application or system. For this reason, it is […]

How to create a comprehensive security ecosystem

Just as the way businesses use technology has changed over the past 5 years, so too has the cybersecurity threat landscape. Previously, businesses were concerned with securing a small number of systems, such as networks, phone systems and endpoint devices, such as PCs and printers. As businesses have introduced new technologies to increase productivity, collaboration, […]