Category Archives: Blog

Advice from the front line of Security – the SOC analyst

Security Operations Threat Analysis As we are all aware many organisations have adopted working from [...]

I’ve asked a forensics company to do some work for us. What should I expect back from them?

The background: Mary from Accounts, having fallen under suspicion for her snack purchases, has been [...]

The Importance of Rebooting

Why is reboot required? Rebooting helps the device to work better by clearing the temporary [...]

What is digital forensics all about anyway?

It’s a fair question. You might think something has happened on an electronic device, and [...]

Free Security Protection for Your Mobile Phone

Why Your Phone Needs Protection. Protect your personal data & stop cyberattacks! Learn why traditional [...]