Password protection pitfalls and how to avoid them.

What’s in a name? We are frequently reminded and prompted every time we make a new password to ensure it is ‘strong’ and not easily guessable or hackable by bad actors and hackers. Despite these warnings many people still use repeated passwords or combinations of names of loved ones and birthdays or other significant dates…

Read More

How to build brand trust online

Brand theft and ‘form jacking’ In our recent articles we have been discussing the scope of online threats and the ways you can protect and mitigate against cyber-attacks. Be they through your email, connected networks or digital assets, these threats exists and one issue this has created that we haven’t yet touched upon is an…

Read More

Keep up to speed with Cyber Security

In a previous post we looked at Cyber Hygiene and the importance of building cyber security practices into the heart of your operations.  In this article we will be furthering the philosophy that prevention is better than cure, with a comprehensive list of resources that can help you keep up to speed with the rapid…

Read More

Cyber hygiene – prevention is better than cure

What is cyber hygiene Cyber hygiene is an ordered routine of specific tools, checks and practices which safeguard the handling of essential data, and secure networks and ‘attack surfaces’ (the areas in your network that are vulnerable to attack). Cyber hygiene practices are specific to the needs of the organisation and of specific individuals or…

Read More

Why does your organisation need a cyber security policy?

In our last post we discussed the impact of our working from home (WFH) and hybrid remote working styles on organisational security. The context for this is a rapidly expanding cybersecurity sector and a critical level of cyber-attacks from hackers in response to new technologies and software that seek to prevent them. In turn there…

Read More