Security

Phishing Email Reporting

If you think you've received a phishing email, you should report it to the NCSC and mark it as “Phishing” on your email security. You can forward suspicious emails to [email protected] so that the National Cyber Security Centre (NCSC) can investigate it....

read more

How to avoid scammers

If you need some advice on how to avoid scammers, read on. Here is your quick and easy guide to stop the scammers.Paying over the phone Received a phone call from a company you know and use, or your bank, asking for payment? Alarm bells should start ringing. NEVER...

read more

Business Cyber Security Update for 2023

There are only two types of companies, those that have been hacked and those that will be. This is what the FBI’s Director said 10 years ago! So which one are you?  Here is a short business cyber security update to help you. One of the best ways to protect your...

read more

Review your cyber security

Why a regular review of your cyber security protection is a good idea for your business. Can you afford to be complacent when it comes to security? Not when over half of all cyber-attacks are occurring against small businesses. Due to the war in Ukraine, and with more...

read more

Phishing – are your staff the weakest link?

Here is your free guide on how to spot scam phishing emails. Unfortunately, it doesn’t matter how much security software you add to your hardware if you don’t protect your emails and train your staff to recognise and avoid hackers. Okay, so that might sound a bit...

read more

What is Smishing?

Most of us have been targeted by fraudsters using a technique called Smishing. You may not have even been aware of it.  But what is Smishing? Smishing is when fraudsters use SMS phone messaging to impersonate a trusted organisation in an attempt to steal your personal...

read more

Email and Cyber Attacks

Businesses across the planet rely on email to communicate, collaborate, and be productive. But that heavy reliance upon a single tool puts the email of businesses like yours squarely in the crosshairs of cybercriminals intent on doing harm.  Your business must...

read more

Managed Cyber Security

The 2022 World Economic Forum Global Cybersecurity Outlook1 demonstrates that the top three cybersecurity risks for businesses are ransomware, social engineering, and malicious insider activity.  That is why you should review your managed cyber security provider on a...

read more

What is email secure gateway?

Secure Email Gateways (SEGs) Secure Email Gateways (SEGs) are a way of protecting your business from malicious emails and subsequent cyber fraud. They work by sitting inline on an email pathway, reaching from the sender via the public internet used, to your business...

read more

Business email security

From time to time, we reach out to current clients to let them know about emerging cybersecurity dangers and to inform them of the solutions available to combat those threats.  Here we look at business email security. According to a survey commissioned by Egress, 83%...

read more

The end of basic authentication by Microsoft

Most businesses are using some kind of Microsoft application, so if you are not aware of the changes to how you and your staff login, this will be of interest to you.  This blog explains what the end of basic authentication means for you. What is changing and when: As...

read more

Cyber attacks on small businesses

Did you know small businesses are an easy target for cybercriminals?Cyber attacks on small businesses are rising, but why? Because unfortunately, cyber security for small businesses is limited to non-existent. Many presume they will not fall victim to cybercrime. As...

read more

Cyber security health check

Do you have concerns over your Cyber Security? Perhaps an IT Security health check would help give you peace of mind.Why a Cyber Security health check is a good idea:Protecting your IT network and computers ensures they’re not vulnerable.We can spot any...

read more

How to secure your email account

Knowing how to secure your email account is paramount. Hackers can use email accounts as a way of breaching networks. Once they gain access, anything within that network becomes vulnerable. What are the different ways hackers can gain access to your network via email?...

read more