Cyber Security Authentication leaps forward with passwordless

Ultimately all businesses need a way to securely connect their users – employees, partners, contractors, customers – to the right applications at the... Read more

Cyber Security Who are you relying on for your cloud security?

With an increasing demand for flexible, mobile, and location-independent work environments, organisations have to adjust and take advantage of cloud... Read more

Cyber Security How much of your data was lost last year?

‘Data visibility’ and ‘Data Loss’ are two of the prevailing challenges for organisations into 2021 and beyond thanks to the upsurge of a dispersed... Read more

Cyber Security What is a Trojan?

The Trojan Horse story is well-known, with the old saying – beware of Greeks bearing gifts. Trojan computer viruses take their name from the hollow... Read more

Cyber Security How to master email security with DMARC

This blog is the final part of our 3-part series on DMARC email security. Read Part 1: What is SPF, DKIM and DMARC? Read Part 2: A closer look at how... Read more

Cyber Security A closer look at how DMARC works

This blog is Part 2 in our 3-part series on DMARC email security. In Part 1, we explored the foundations of DMARC and how it builds on SPF and DKIM... Read more

Cyber Security What is SPF, DKIM and DMARC?

This blog is Part 1 in our 3-part series on DMARC email security. Read more

Cyber Security Airstrike Attack: breaking into a locked domain-joined laptop (CVE-2021-28316)

On Wednesday 14th of April, Matthew Johnson, one of our senior security consultants released details of a new wireless-based attack dubbed... Read more

Cyber Security Here’s how you can bolster your defences against an APT attack

To be “slow and low” is an Advanced Persistent Threat (APT) signature. Unnoticed, they penetrate security walls and find their way into networks and... Read more

Cyber Security Do you Believe What you See? How Deepfakes Are Reshaping Cyber Threats

What used to be an internet oddity has developed into a widely destructive political and social force: Deepfakes. They have become one of the most... Read more

Cyber Security The end of trust?

Trust no-one! The ‘Zero Trust’ approach sets up a framework within cyber security that makes one huge assumption: don’t trust anyone who is accessing... Read more