Researchers have identified the growth of a strain of malware called ZuoRAT that has been infecting SOHO routers across Europe and North America…
Read MoreZero-day ‘Follina’ bug targets installed versions of Microsoft Office
A zero-day bug called ‘Follina’ is actively exploiting installed versions of Microsoft Office.
The vulnerability has been spotted in the wild being used by Chinese hackers to target the Tibetan community. This flaw is about much more than just politics though.
It affects Office 2013 and 2016, installed versions only.
As far as we can tell, Office 365 is not impacted.
Read More5 actions small businesses need to take to protect their customers from cyber threats
With everyone spending more time and money on the internet, protecting yourself and your customers is essential.
Unfortunately, most small business owners are too busy coping with day to day tasks to spend time learning about cyber security or how threat vectors work.
But there are things every small business can do.
We’ll outline 5 things every small business can do to protect themselves and their customers.
Read MoreEmail filtering is still an important cyber security defence
Email filtering is software designed to inspect all incoming email and assess whether it’s legitimate or spam.
This provides the strongest protection email-borne malware you can get right now.
Read MoreThe Cyber Security Breaches Survey 2022 and how to protect your business
There aren’t many surveys that come from the government we recommend reading, but the The Cyber Security Breaches Survey is one of them.
It’s a comprehensive survey that gives valuable insight into the risks that British businesses face every day.
As you can imagine, reading the Cyber Security Breaches Survey can be sobering.
Yet it’s vital that every business knows the environment they are operating in and the risks they face.
Read MoreWorld backup day – 31st March 2022
It’s national backup day and while there seems to be a day for everything these days, this one is important.
If world events have taught us anything, it’s that being prepared is essential.
That’s especially true for businesses.
Read MoreHow charities and non-profits can avoid phishing attacks
The biggest vulnerability in any system is the person using it. People are fallible. We can be fooled, tricked and taken advantage of.
That’s what phishing is designed to attack.
But, with a little education, you and your teams can avoid the worst of these risks.
We want every charity, good cause, school and not-for-profit organisation to be safe.
This post will hopefully help with that.
Read MoreCyber security tips for charities, non-profits and good causes
There are lots of little things you can do to improve your cyber security that doesn’t cost anything and won’t require technical knowledge.
We’re going to share some simple, actionable steps anyone can take to protect their good cause from cybercrime.
Read MoreCyber security and charitable/not-for-profit organisations – the lowdown
We work with a lot of organisations in the charitable and not-for-profit space so we thought we would put together a quick guide to cyber security for anyone in that industry.
We find its important to understand why and how a breach could occur and then its simpler for organisations to prioritise what they need from a solutions perspective. If you know the reasons why, you can help to prevent a disaster should the worst happen and manage the situation with minimal disruption.
Read MoreNational Cyber Security Month – Our Advice for SME’s
Every SME should protect themselves against Cyber Crime, with it being National Cyber Security Month, we’ve put together a quick rundown of areas every SME should be addressing to prevent a breach.
The biggest threat currently are ransomware attackers, this type of cyber criminal effectively holds your data hostage until they get their ransom payment. They will often research organisations first, hacking into accounts data to see how much they can afford or they may just be interested in taking your data.
There are various ways these hackers can infiltrate your systems so here are the top areas every business should tighten up in…
Read More