BlogCyber Security 101 What is quishing and how can you protect your business? Quishing or QRishing is a type of phishing scam that uses QR codes to trick…Rob SApril 15, 2024
BlogCyber Security 101 Anti-virus vs Anti-malware: what’s the difference? Antivirus and anti-malware are the basic building blocks for any small and medium enterprise’s (SME)…Rob SApril 5, 2024
BlogCyber Security 101 Malware-as-a-Service and the rise of DIY cybercrime Cybercriminals are always looking for the next sophisticated method to target businesses. And as a…Rob SMarch 22, 2024
BlogCyber Security 101 What is spear phishing? For many people, hearing the phrase ‘spear phishing’ conjures up images of intrepid divers hunting…Rob SMarch 20, 2024
BlogCyber Security 101 What is a banking trojan and how do you stop one? Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound…Rob SFebruary 29, 2024
BlogCyber Security 101 How nation-state cyber warfare affects you We live in a time of increased international tensions. You can scarcely open a newspaper…Adam PiltonFebruary 23, 2024
BlogCyber Security 101 Demystifying malware: The 5 stages of a malware attack Malware is almost as old as the first personal computers. And like anything that’s existed…Rob SFebruary 14, 2024
BlogCyber Security 101 What is a remote access takeover? Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4…Rob SFebruary 7, 2024
BlogCyber Security 101 What is fileless malware and how can you safeguard your systems? The most elusive of all malware; fileless malware is a threat you can’t afford to…Rob SJanuary 30, 2024