Category Archives: Blog

You have a vulnerability scan report, now what?

You have a vulnerability scan report, now what? A great way to identify your IT [...]

Cyber Security Tips for Black Friday

Just as the decorations seem to go up earlier and earlier each year, the surge [...]

So You Clicked On A Phishing Link – Now what?

“November & December” is the time where many vendors promote their products with offers as [...]

Cyber Security Quiz 2021

Welcome to our Cyber Security Quiz 2021. To celebrate Cyber Security Awareness Month in October, [...]

Are you being hacked through WiFi networks?

Criminals use insecure WiFi to steal passwords and put viruses and spyware on your device. [...]

Why you should stay on guard against mobile phishers

You might spot a phishing email on your computer, but it’s much harder on your [...]

Demystifying mobile security

Your one-stop guide to mobile security acronyms and how the solutions fit together The tech [...]

Mobile Security and GDPR

If you access company info on your phone, you need think about GDPR GDPR applies [...]

Are employee phones leaking your customer data?

A data breach can cost your organisation heavily in fines, reputation, lost customers. MTD protects [...]

6 reasons why cybercriminals want to target your smartphone

The data is in, and it doesn’t look good: mobile devices are a primary target [...]