BlogCyber Security 101 What is spear phishing? For many people, hearing the phrase ‘spear phishing’ conjures up images of intrepid divers hunting…Rob SMarch 20, 2024
BlogCyber Security 101 What is a banking trojan and how do you stop one? Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound…Rob SFebruary 29, 2024
BlogCyber Security 101 How nation-state cyber warfare affects you We live in a time of increased international tensions. You can scarcely open a newspaper…Adam PiltonFebruary 23, 2024
BlogCyber Security 101 Demystifying malware: The 5 stages of a malware attack Malware is almost as old as the first personal computers. And like anything that’s existed…Rob SFebruary 14, 2024
BlogCyber Security 101 What is a remote access takeover? Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4…Rob SFebruary 7, 2024
BlogCyber Security 101Industry 6 key takeaways from the DCMS Cyber Security Breaches Survey 2023 Each year, the Department for Digital, Culture, Media & Sport (DCMS) releases its hotly anticipated…Rob SJune 29, 2023
BlogCyber Security 101Industry What do the proposed NIS regulations mean for managed service providers? As attendees of our event CyberSmart Live! will know, one of the hottest topics within…Rob SJune 16, 2023
BlogIndustryInside CyberSmart Press release: Heightened risk of insider threats during cost-of-living crisis, according to SME study Our latest research (to be released as a report) reveals fear among UK SMEs about…Rob SJune 15, 2023
BlogCyber Security 101 What is a cyber warranty? Cyber insurance is fast becoming a necessity for modern business. In the last 12 months…Rob SMay 19, 2023
BlogCyber Security 101 How much of your IT budget should you spend on security? It looks like IT budgets will continue to grow this year despite the threat of…Rob SApril 18, 2023