Cyber Security Awareness

Instagram Scams

The most common Instagram scams and how to avoid them

Instagram is the world’s fastest-growing social media platform, so it comes as no surprise that it has attracted the attention of fraudsters who are keen to cash in on the platform’s popularity. Since it launched in 2010, the app has amassed more the 1.15 billion active users who share a…

Read Article

Cyber Security New Year's Resolutions 2021

Cyber Security New Year’s Resolutions for 2021

With the door firmly closed on 2020, it’s important we look ahead and make Cyber Security New Year’s resolutions that will increase our cyber resilience, reduce risk and protect us from the type of threats that have dominated the last 12 months. Cybercrime flourished during the pandemic as opportunistic cybercriminals…

Read Article

Christmas cyber Scam

Top 5 Christmas Cyber Scams

Cyber scams are a persistent problem for organisations at all times of the year; however, there is a steep increase in scams at Christmas as cybercriminals take advantage of distracted staff to launch targeted attacks. When we’re distracted, mistakes happen, and Christmas tends to be the one time of the…

Read Article

The Cyber Threats Keeping CISOs up at Night

The Cyber Threats Keeping CISOs up at Night

The position of a Chief Information Security Officer (CISO) is by no means an easy one. The constantly evolving threat landscape, digital transformation, and compliance with the latest regulations and requirements can all pose significant challenges to CISOs. The Coronavirus pandemic has also heightened Cyber Security concerns and created a…

Read Article

How much is your data really worth

How Much is Your Data Really Worth?

The continual stream of high-profile data breaches has made us acutely aware of how valuable our data has become and the damage that can ensue if it falls into the wrong hands. There are a host of reasons why hackers want to get their hands on our sensitive data but…

Read Article

What is Credential Stuffing

What is Credential Stuffing?

Credential stuffing has been dominating the headlines in recent years and has fast become the attack method of choice used by cybercriminals. Between January 1, 2018, and December 31, 2019, Akamai Technologies recorded more than 88 billion credential stuffing attacks across all industries. This figure is only expected to rise…

Read Article

Protecting Charities from Cybercrime

Protecting Charities from Cybercrime

This week is Charity Fraud Awareness Week and it's been specifically set up to provide charities with valuable advice on how they can protect themselves from the threat of fraud and cybercrime.

Read Article

Cyber Security best practices

6 Cyber Security Best Practices to Protect Your Organisation

Cybercrime has become a major problem for organisations around the world. Data breaches continue to dominate the headlines, and the Coronavirus pandemic has highlighted the need for improved cyber security practices to defend against evolving threats. Small to mid-sized organisations are increasingly under attack and are proving to be a…

Read Article