News
Pineapples and man-in-the-middle attacks (MIM)
Have you ever grabbed your laptop at a coffee shop, connected to the free Wi-Fi, and got to work without a second thought? You’re not alone....
Offboarding former employees efficiently and why it’s so important
As a business owner or manager, you have probably spent a significant amount of time and resources to recruit, train, and onboard employees. But have...
How an internet search history caught a former employee in the midst of a cyber-attack
We often talk about the cyber security risk that both current and former employees pose if procedures and policies are not properly followed. An example...
How are your construction workflows at risk of cyber-attacks
As a construction business employing modern technologies, you might feel safe in the knowledge that the bulk of your operations take place offline and therefore...
Why does cyber security matter for Early Years practitioners?
The National Cyber Security Centre issued guidance for Early Years practitioners earlier on this year, following a rise in the threat level facing the education...
A guide to tackling the unique cyber vulnerabilities that the Manufacturing industry faces
In a guest blog by James Cash, founder and MD of Birmingham IT support company, Superfast IT and advocates of the WMCRC business starter membership,...
How secure is your website?
So, you have created a fantastic website that is pretty on the eye and is performing well in search engines and in your analytics, but...
How can the NCSC’s Small Business Guide help my retail or ecommerce business?
The retail industry is responsible for around 16% of the West Midlands economy which makes it the largest in the region. Birmingham is the leading...
Spotting the signs of phishing phone scams
Phishing is a type of cyber crime whereby cyber criminals attempt to extract sensitive information through email messages, website or phone calls appear to be...