The hidden dangers of free VPNs: Are you at risk?
Free VPNs may seem tempting, but they could be exposing your data to cyber criminals. We tell you how to protect your business.
Free VPNs may seem tempting, but they could be exposing your data to cyber criminals. We tell you how to protect your business.
Cyber attacks aren’t reserved for big corporations. We show you how to protect your business from cyber criminals.
Cyber criminals are using images embedded into emails.
We’ll tell you how to protect your business from these new phishing scams.
The most likely targets for all sorts of cyber attacks are small and medium sized businesses. They don’t have the budgets for dedicated staff or numerous layers of protection.
But the weakest link in any security chain is your staff.
Good cyber security awareness training is essential for everyone in your business.
You will need a strategy to start with.
We explain how Microsoft Edge is introducing some new security-boosting features to help you stay one step ahead.
How many times a day do you respond to an email without really thinking about its contents?
Maybe it’s a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you’ve fallen victim to a Business Email Compromise (BEC) attack.
A BEC attack occurs when a cyber criminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.
It might sound like something that only happens to big corporations, but that’s not the case.
According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than £20 billion over the past few years.
And Microsoft brings more bad news, with its recent findings showing that they’re getting both more destructive and harder to detect.
Old computers and external drives can put your sensitive business data at risk.
We look at how to dispose of old computers and external drives in the safest way possible.
One day it could save your business
Backing up your data is one of the strongest precautions you can take. Set it up properly and make it part of your routine to check that it’s working. Because one day your backup could save your business.
We all hope disasters will never happen.
But of course they can, and do. So it’s best to be prepared. That’s why a reliable backup system is one of the most important protections you can put in place.
Where do you start? Watch our latest video for some expert advice.
Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go.
They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge.
The security risk of “juice jacking” was long thought to be more theoretical than real, but the tech needed to carry out an attack has got smaller and cheaper and easier to use. This means less sophisticated criminals are now turning their hand to it.
So how does it work?
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
OKLearn moreWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
The following cookies are also needed - You can choose if you want to allow them:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy