Category Archives: Blog

Are you being hacked through WiFi networks?

Criminals use insecure WiFi to steal passwords and put viruses and spyware on your device. [...]

Why you should stay on guard against mobile phishers

You might spot a phishing email on your computer, but it’s much harder on your [...]

Demystifying mobile security

Your one-stop guide to mobile security acronyms and how the solutions fit together The tech [...]

Mobile Security and GDPR

If you access company info on your phone, you need think about GDPR GDPR applies [...]

Are employee phones leaking your customer data?

A data breach can cost your organisation heavily in fines, reputation, lost customers. MTD protects [...]

6 reasons why cybercriminals want to target your smartphone

The data is in, and it doesn’t look good: mobile devices are a primary target [...]

So what is MFA all about?

MFA (Multi Factor Authentication) or 2FA (2 Factor Authentication) is a simple yet effective way [...]

Setting a standard

“The nice thing about standards is that you have so many to choose from” – [...]

Five Common IT Security Vulnerabilities and How to Avoid Them

In this article, technical experts from our partners Appcheck are looking at five of the [...]

Gone Phishing

Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding [...]