Security

Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a fraudulent email, SMS, or instant message. This message is designed to deceive the victim into sharing sensitive information or clicking a link that...

On January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware targeting organisations within the Ukraine. The Ukraine government has indicated that they have ‘evidence’ that the cyberattack was carried out by Russian nation-state actors. Russia has since stated that it has...

Just as the way businesses use technology has changed over the past 5 years, so too has the cybersecurity threat landscape. Previously, businesses were concerned with securing a small number of systems, such as networks, phone systems and endpoint devices, such as PCs and printers....

The rise of hybrid working has forever changed how businesses must view their security posture. As employees are now working between multiple locations, the risk of data breaches, cyberattacks and network intrusion has grown exponentially. With employees working from home, it is more difficult for...

All industries have undergone a period of digital transformation over the past two decades. The advancement of technology has had a myriad of benefits for businesses, including increased profitability, productivity and some technologies have completely changed the way businesses function. The construction industry now relies...

We’ve all had that call, “Hi it’s your Bank, we need to talk to you about your account”. However, how do we know if it’s genuine? Therefore, to try and combat this, many of the Country’s leading banks have teamed up with Stop Scams UK, Global...