News
Effective cybersecurity training: How to build behavioural resilience in your organisation
We’ll be the first to admit that a lot of cybersecurity training can be a little on the bland side. slideshow, a PDF, maybe a 45-minute e-learning module...
How to create a cyber security audit for your busines
When was the last time you checked how secure your business is online? If you’re like most small business owners, the honest answer is probably: “Er… never?” Or...
Why you should never mix personal and work passwords
Reusing passwords is one of the most common shortcuts people take online, and it’s also one of the most dangerous. It might seem harmless to use...
Inside the minds of social hackers: How workplace data is being targeted
Almost every company likes to think its biggest threats are digital, things like viruses, ransomware, system breaches. But in reality, one of the easiest ways into a...
Investing in IT and cybersecurity infrastructure – What should you invest in?
IT and cybersecurity can feel overwhelming, especially when budgets are tight and jargon flies faster than you can Google what “endpoint protection” means. But getting IT...
What are the different types of phishing? And how can you protect yourself
Most of us have received a weird email or sketchy text message at some point or another that made us pause for a second. Was that really from...
Lock down your data: A complete guide to locking individual apps on your devices
Nowadays, our mobile devices are way more than just simple phones; they’re digital treasure chests! From banking apps and private conversations to business documents and client data, they hold a staggering...
How secure are your passwords?
Ever wonder how safe your passwords really are? Well, you’re not alone. Last year, a whopping 35,434 people reported their email or social media accounts being hacked. That’s a...
Social engineering and open-source intelligence (OSINT): What you need to know to protect yourself
Sharing personal information online has become a regular part of our daily routines. Whether it’s a post on social media, a casual comment in a podcast,...
Disaster recovery in the cyber supply chain: Is your business prepared?
Let’s imagine a scenario for a second; one of your key suppliers gets hit with a cyberattack. Their systems go down, their data is locked behind...