#LAYERUP for World Password Day this May

May 4th is already a popular date for fans of a certain sci fi franchise, but hopefully the date doesn’t just pass you by without you noticing it’s also World Password Day! Once you have stopped celebrating this momentous occasion and the cake is all gone, perhaps don’t groan too much at the idea of…

Read More

Phishing Scams 101

Phishing scams have become a pervasive threat to businesses of all sizes and industries. These attacks involve the use of deceptive emails, texts, and phone calls to trick individuals into divulging sensitive information or clicking on a link that infects their device with malware. The consequences of a successful phishing attack can be devastating for…

Read More

Top mobile security threats and how to protect against them

Our mobile phones are rarely more than an arm’s reach away, they are our fastest gateway to the digital world, and this is not something that has gone unnoticed by hackers. Here we will look at the top mobile security threats and how you can protect against them.   According to the ONS report for…

Read More

How is Artificial Intelligence changing cybersecurity?

Today we will look at how AI is changing cybersecurity and what it means for business. As touched on in our last article, Cybersecurity challenges and trends for 2023, the new year brought with it further acceleration and adoption of artificial intelligence led security systems, anti-virus software and in contrast, automated machine learning hacking tools.…

Read More

Cybersecurity challenges and trends for 2023

A new year is a good time to take stock, the same goes for gaining an understanding of the changes and updates in the world of cybersecurity. While this may not always feel like a pressing topic, in business, the best thing we can do is be prepared to meet challenges that we are likely…

Read More

What will Web3 mean for cybersecurity?

What is Web3 and why is it happening? At 33 years old, the internet has become both omnipresent in the lives of a vast number of people globally, and omniscient in the way it collects data on us, knows our preferences, our habits, our routines, location, personal information, and the things we like to watch…

Read More

Password protection pitfalls and how to avoid them.

What’s in a name? We are frequently reminded and prompted every time we make a new password to ensure it is ‘strong’ and not easily guessable or hackable by bad actors and hackers. Despite these warnings many people still use repeated passwords or combinations of names of loved ones and birthdays or other significant dates…

Read More

Keep up to speed with Cyber Security

In a previous post we looked at Cyber Hygiene and the importance of building cyber security practices into the heart of your operations.  In this article we will be furthering the philosophy that prevention is better than cure, with a comprehensive list of resources that can help you keep up to speed with the rapid…

Read More

Cyber hygiene – prevention is better than cure

What is cyber hygiene Cyber hygiene is an ordered routine of specific tools, checks and practices which safeguard the handling of essential data, and secure networks and ‘attack surfaces’ (the areas in your network that are vulnerable to attack). Cyber hygiene practices are specific to the needs of the organisation and of specific individuals or…

Read More

Why does your organisation need a cyber security policy?

In our last post we discussed the impact of our working from home (WFH) and hybrid remote working styles on organisational security. The context for this is a rapidly expanding cybersecurity sector and a critical level of cyber-attacks from hackers in response to new technologies and software that seek to prevent them. In turn there…

Read More