IT Blog Category: Cybersecurity
How to stay protected against COVID-19 scams
Hackers have been using people’s fears and sending phishing emails and messages centering on the Coronavirus. In this blog, we explore the latest coronavirus cybersecurity scams. [...]
Covid-19 (Coronavirus): Cybersecurity considerations for remote working
Cybersecurity expert Rob May explores the cybersecurity challenges that remote working brings, and provides advice on what organisations should be doing. [...]
Hunted TV show: A cybersecurity expert’s insight
Understand how a team of security operatives - or hunters - use poor cyber security, among other things, to find ten fugitives on popular Channel 4 programme, Hunted. [...]
How to spot a phishing email
A phishing email tries to get you to let your guard down and give access or information to cyber criminals. They are often designed and written in a way [...]
Artificial intelligence and the future of cybersecurity
In the business environment, AI is currently being used to analyse large amounts of data and to help streamline processes, it is also increasingly being used as a method [...]
Passwords are broken – the rise of Multi-factor Authentication
Passwords alone are no longer sufficient to protect an organisation from cybercrime. Find out how Multi-factor authentication can protect your organisation. [...]
Why physical security is part of cybersecurity
With so much of the cybersecurity discourse focusing on the "cyber" aspect of the security, it's easy to get tunnel vision. Installing antivirus and a firewall is just one [...]
What is a human firewall and how do you secure it?
Cyber attacks are now part of the IT landscape and we won’t ever get rid of them, but by changing the way we use IT systems and by improving [...]
How to Perform A Vulnerability Assessment
Vulnerability assessments help you understand your business's strengths and weaknesses to cyber crime. Find out more about how to perform one. [...]