Over the past 7 days, we’ve seen a sharp increase in phishing attacks across multiple client environments. This isn’t just background noise — it’s a clear spike. And these aren’t... read more →
Over the weekend, reports of an eBay outage sparked widespread frustration — and even claims of a potential DDoS cyberattack. While the outage itself was very real, the cause remains... read more →
Conduct regular training and awareness with your workforce to highlight the risks of social engineering and phishing. Specifically, have robust controls over new account requests or password resets and always... read more →
Microsoft have identified an exploit in iOS 18.4 They have released 18.4.1 which should be applied as soon as possible.
Having Cyber Essential Certification is a great start in helping to protect your network, emails and cloud data. By applying for the certification will put procedures in place to combat... read more →
Although Face ID activation to unlock you phone makes it easy, if your phone is snatched from you it is easy to get in to the phone by put the... read more →
With today's cyber criminals more prevalent where possible use MFA to secure your accounts. The microsoft authentication or google authetication apps are ideal for MFA. In Office 365 go to... read more →
Do you as a company invite your IT support company to your strategy meeting ?. If not why not. Having worked with may start up and successful business we at... read more →
More and more scammers are using the telephone scam to take control of your PC/Laptop and empty your bank accounts. As telephone numbers can be spoofed you get a call... read more →
Your LinkedIn business profile is another route to engage with followers, potential clients, expand your business in terms of career opportunities and generally market your company. LinkedIn is one of the... read more →
Recent Comments