BlogCyber Security 101 What is a banking trojan and how do you stop one? Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound…Rob SFebruary 29, 2024
BlogCyber Security 101 Demystifying malware: The 5 stages of a malware attack Malware is almost as old as the first personal computers. And like anything that’s existed…Rob SFebruary 14, 2024
BlogCyber Security 101 What is a remote access takeover? Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4…Rob SFebruary 7, 2024
BlogCyber Security 101 What is fileless malware and how can you safeguard your systems? The most elusive of all malware; fileless malware is a threat you can’t afford to…Rob SJanuary 30, 2024
BlogCyber Security 101 Why small businesses are at greater risk of malware attacks Malware attacks are a well-known concern for businesses, but what type of business is more…Rob SJanuary 22, 2024
BlogCyber Security 101 Key takeaways from the CyberSmart SME cost of living crisis report The current economic climate has seen better days, but how are the UK’s small businesses…Rob SJanuary 10, 2024
BlogCyber Security 101 New: CyberSmart’s SME cost of living crisis report At CyberSmart, we recognise that the cost of living crisis not only affects our personal…Rob SJanuary 8, 2024
BlogCyber Security 101 How to avoid phishing scams on Facebook Messenger for Business Almost since its birth, Facebook has been an important tool for small businesses. It’s a…Rob SDecember 18, 2023
BlogCyber Security 101 How to spot a malware attack on your business: 5 tell-tale signs Like an unwanted guest causing friction at a party, malware can disguise itself, trick your…Rob SNovember 24, 2023
BlogCyber Security 101 Press release: A third of SME business leaders do not trust some, most or any employees with confidential information One in three UK SME business leaders do not trust some, most or any of…Rob SOctober 18, 2023