Do you know if any of your staff would click a dodgy link?

Do you know if any of your staff would click a dodgy link?

Phishing is one of many cyber-crimes and it’s a pain.

Emails are sent by criminals pretending to be someone they are not, hoping someone will click on a link and accidentally provide them with access to your data.

Do you think your team would be able to spot that phishing email?

Watch the latest video to see the easy way to check.

The most severe security threat ever is affecting the whole internet

The most severe security threat ever is affecting the whole internet. Here’s what you need to know

There’s a major security alert that’s affecting the whole of the internet right now. Security researchers have called it one of the most severe vulnerabilities the world has ever seen.

Phishing is still the most likely way for your business to be breached

This new survey confirms what any IT professional could tell you: Phishing is still the most likely way for your business to be breached

Be prepared: your business WILL be attacked

5 steps to improve your ransomware resilience

Ransomware is the one of the most terrifying and concerning data security threats your business will face.

What if your staff try to login one morning but all they see is a bright red screen saying your data has been encrypted, and you must pay a huge ransom in Bitcoin to get it back.

Terrifying? Concerning?

Read our new guide now. We’ll answer all your questions about ransomware. Plus you’ll discover five steps to improve your business’s ransomware resilience.

How to turn off the password manager in Chrome

I recommend that you use an external password manager rather than the browser version. If you try to use both it can be confusing and time consuming. Turn off the browser password manager.
This video shows you how to turn off the password manager in Chrome

What is Multi-Factor Authentication (MFA)?

What is multi-factor authentication (MFA)? MFA is one of several simple security measures you can use to raise the protection level for your business. Our latest video explains what, how and who you need to start using it in your business.

See how one click could shutdown your business

If your business uses computerised systems and let’s face it, most do, one of the biggest risks to it these days is ransomware. Hackers break into your IT systems and lock your files and hold your data to ransom.

One click is all it can take to start the shutdown of your business. Without access to data many businesses can be unable to operate.

We asked a certified ethical hacker to break into three computers using different types of attack. He filmed it from both ends – as the hacker, and what was happening on his victims’ machines.

Is your biggest security threat to your business on your payroll?

Insider attacks on your business –  the costs and your strategy to prevent insider attacks

Most insider attacks are not malicious, stead they are accidental, but the chances of attacks coming from inside your business are high.

A member of staff clicking on a bad link by mistake is all it takes.

But there are some attacks caused by malicious attackers, deliberately looking to do damage to your systems, or make money.

Both of these kinds of attacks can be prevented and minimised by focusing on five key areas in your IT strategy.

Read our new guide now to assess how prepared your business is.

What to do if you click a bad link on your phone

What should you do if you click a bad link on your mobile phone?

Many of us have done it and then realised it wasn’t what we thought it was.  What might have done in the background on your phone?

The first thing is not to panic. But, you must then quickly take action.

Take a look at out latest video for help

9 Types of Malware – an easy to read guide

There are billions of malware variants and all businesses are being target by them, all the time.

Malware is malicious software that is design to either damage or steal your data

We’ve written an easy to read (hopefully) guide to the top nine most common types on malware.