Category Archives: Blog

Setting a standard

“The nice thing about standards is that you have so many to choose from” – [...]

Five Common IT Security Vulnerabilities and How to Avoid Them

In this article, technical experts from our partners Appcheck are looking at five of the [...]

Gone Phishing

Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding [...]

Understanding Hash Values

What is that MD5/SHA-1/SHA-256 thing I see when I go to download an application? When [...]

Four simple tips to avoid being the low hanging fruit for cyber criminals

Before we start, relax! I’m not selling anything. If anything, I’m unselling. I’m not a [...]

Advice from the front line of Security – the SOC analyst

Security Operations Threat Analysis As we are all aware many organisations have adopted working from [...]

I’ve asked a forensics company to do some work for us. What should I expect back from them?

The background: Mary from Accounts, having fallen under suspicion for her snack purchases, has been [...]

The Importance of Rebooting

Why is reboot required? Rebooting helps the device to work better by clearing the temporary [...]

What is digital forensics all about anyway?

It’s a fair question. You might think something has happened on an electronic device, and [...]

Free Security Protection for Your Mobile Phone

Why Your Phone Needs Protection. Protect your personal data & stop cyberattacks! Learn why traditional [...]