by David | Mar 4, 2017 | Uncategorized
We’ve just released a new ebook covering 5 of the most critical cybersecurity risks that your legal firm is likely to have happening right now. The ebook provides practical solutions to the issues, as well as a useful checklist that will help you engage with...
by David | Jan 13, 2017 | Blog
It’s been close to 18 months since the arrival of Windows 10. In that time, Microsoft has (deservedly) received endless criticism to the new OS’s approach to user privacy. Not much has changed since the release, with Microsoft sticking to its original policy...
by David | Jan 13, 2017 | Blog
Ransomware has been hitting the cybersecurity headlines throughout the last year, and it shows no sign of slowing down. The latest varients are now targeting a number of remarkable victims, and demanding huge patments to unlock the encrypted data. So what are these...
by David | Jan 11, 2017 | Uncategorized
It’d been a number of years since the initiative of Bring Your Own Device became a hot topic in the cybersecurity world. I’ve worked with companies around the Manchester and Liverpool areas for some years, and the popularity seems to have now peaked. In...
by David | Jan 11, 2017 | Uncategorized
USB sticks are everywhere. They’ve been with us for a long time now. They’re portable, convenient, and one of the most consistent security weakpoints for businesses for more than a decade. USB drives are handy rewritable memory devices that are great for...
by David | Jan 10, 2017 | Uncategorized
With Ransomware attacks hitting the news on an almost daily basis, the question has to be asked – why isn’t antivirus working anymore? It seems that the answer given doesn’t feel like a satisfactory explanation – standard AV detection works on the decades old approach...
by David | Jan 9, 2017 | Blog
As the internet has grown, so have the number of incredibly useful services. Some of these services are providing functionality that internal IT departments don’t yet offer, and many employees are setting up accounts with online document sharing sites, CRM...
by David | Jan 9, 2017 | Blog
Your business operates online. Whether it’s just for email, a simple website, or a full-featured application that your customers access, it all relies on connections to the wild-west of the internet. Security vulnerabilities are weaknesses in the system. The...
by David | Dec 15, 2016 | Blog
The latest twist in the ransomware story has come as an unwanted early Christmas present for some. “Popcorn Time” is the latest variant of the file-encrypting malware, but the difference with this one is that it gives an option for those who don’t want to pay the...
by David | Oct 13, 2016 | Blog
What is phishing? It’s a effort to glean sensitive information from a target, often for a malicious reason, such as to enable fraud or unauthorised systems access. Usually the information that is sought contains passwords, or credit card details. It’s...
Recent Comments