
IT Blog Category: Cybersecurity

5 Common Emails Scams To Look Out For – With Examples
Having been around for a few decades now, it will be no surprise that email scams have become increasingly sophisticated. In this blog we review the common email scams [...]

How to password protect files on your computer
Keep all your files safe and secure by adding password protection. Find out how with our step by step instructions on password-protecting PDFs, Word and Excel documents. [...]

How and Why You Should Delete Your Cookies
Deleting your cookies has a number of benefits, from giving you more control over ads to protecting yourself from cybercrime. And yet, many people rarely do so, or even [...]

7 Cybersecurity Myths Debunked
There are so many myths surrounding cybersecurity that it can be hard to know what is best practice and really worth your time. Take a closer look at some [...]

How to stay protected against COVID-19 scams
Hackers have been using people’s fears and sending phishing emails and messages centering on the Coronavirus. In this blog, we explore the latest coronavirus cybersecurity scams. [...]

Covid-19 (Coronavirus): Cybersecurity considerations for remote working
Cybersecurity expert Rob May explores the cybersecurity challenges that remote working brings, and provides advice on what organisations should be doing. [...]

Hunted TV show: A cybersecurity expert’s insight
Understand how a team of security operatives - or hunters - use poor cyber security, among other things, to find ten fugitives on popular Channel 4 programme, Hunted. [...]

How to spot a phishing email
A phishing email tries to get you to let your guard down and give access or information to cyber criminals. They are often designed and written in a way [...]

Artificial intelligence and the future of cybersecurity
In the business environment, AI is currently being used to analyse large amounts of data and to help streamline processes, it is also increasingly being used as a method [...]