Category Archives: Blog

Is it time we killed off passwords?

Passwords are the most common type of account authentication. We use them to log into almost every app, website, and device. Unfortunately, they are also the weakest link in cybersecurity. Recent attacks at Cisco Talos, Twilio, and Cloudflare, have all shown that basic account authentication is failing to keep the hackers out. Passwords are a […]

Why Cyber Security Training is So Important

Organisations are always looking for ways to enhance their security practices, and one of the most effective ways of doing so is to enrol employees in cybersecurity awareness training courses. By taking time to educate employees about how to keep themselves and the business safe, you can mitigate a lot of security threats that we […]

Outsourcing Your Cyber Security

Outsourcing the IT and cyber security for your organisation is an excellent way to save money and time, as well as overcome a very significant and growing cybersecurity skills gap. Outsourced Cyber Security programs can help reduce the burden on you in terms of cybersecurity, taking technical responsibilities out of your hands. Outsourced cybersecurity can […]

Our favourite threat intelligence blogs, news sites and resources

You need to keep up with the real-world threats to stay safe but cyber security and threat intelligence are fast-paced dynamic spaces. Finding good and useful resources can be tricky. So we have put together a list of our favourite blogs, news sites, and threat intelligence resources for you to keep an eye on. None […]

Follina MS Word Vulnerability – all you need to know

Follina – it’s just a clever name The name Follina comes from an area not far from Venice, in the North West of Italy. While this seems interesting the name is not important. The name comes from an executable file called 05-2022-0438, the 0438 is the area dialling  number for Follina. So while its clever, […]

Securing your Single Page Applications and API Endpoints  

Much of the web is made up of multi-page and single-page applications. SPAs are exploding in popularity because they perform a lot of real-time functionality such as updated content, facilitating personalization, and improved user experience. An important feature of single-page applications is performance. They get a performance boost by loading HTML, CSS, and JavaScript resources […]

Secure your IT multiverse with Managed Detection and Response (MDR)

Multiple IT environments are the norm for most businesses. The rapid transition from on-premises to cloud is growing, with the pandemic advancing online technology exponentially in the past 2 years. The ‘as a Service’ model has all the benefits of easy billing access to cyber security experts and the assurance of a maintained environment. For […]