Loading

Why your IT team needs cyber security training

Organisations often fall into the trap of lumping cyber security together with their other IT functions. Although they are obviously connected – anti-malware, firewalls and a host of other technologies are a core part of…

The pros and cons of vulnerability scanning

Scanning your networks and software for security vulnerabilities is essential for keeping your organisation secure, but it’s not a perfect solution. It will help you identify weaknesses in your system – with new ones being…

Top cyber security tips for keeping kids safe…

If you’re among the millions of people working from home while also trying to entertain and educate your kids during the coronavirus pandemic, we imagine things have been pretty chaotic. Were it not for the…

How to start your career in cyber security

The cyber security industry is booming. Organisations are increasingly using technological solutions to perform core functions, and they need a way to make sure these processes aren’t vulnerable to cyber attackers. This influx in opportunities…

Infographic: Cyber Attacks and Data Breaches of 2019

Throughout 2019, we kept an eye on cyber attack and data breach reported in mainstream publications, releasing our findings in our monthly blog series.  This allowed us to see how many security incidents were occurring, how many records were involved and which…

Loading

How to develop a robust cyber security policy

Technological defences and staff training are two of the most frequently touted measures for preventing data breaches, but their effectiveness is dependent on the way organisations implement them. That means creating a detailed cyber security…

Travelex says it won’t pay ransom to crooks…

While most of us spent New Year’s Eve celebrating, the IT department at Travelex was grappling with a ransomware virus that was spreading through its systems. Almost two weeks on, the currency exchange service is…