Blogs

Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

How to Prevent Pharming

  Pharming is one of the scarier types of hacking because it can be so difficult to detect or protect against. This is particularly true of individual internet users – many don’t know how to prevent pharming attacks or even what pharming is.

Read more

10 Working from Home Cyber Risks to be Aware of

As of 2020, over 1/3rd of the population continued to work from home. Fast forward to 2021, and we anticipate that figure hasn’t changed much. Many companies offering work from home benefits, including full remote working, or a mix of office life and working from home.

Read more

What is Pharming in Cyber Security?

A portmanteau of the words ‘phishing’ and ‘farming’, pharming refers to a form of phishing that can be harder to spot and can target a wider range of victims. In this post, we’ll explore what pharming is in cybersecurity services and some ways to tell if you or your business might have been hacked.

Read more

Is Zoom Safe? Discussing Zoom Security Concerns

Video conferencing really took off last year, but after experiencing some Zoom security issues, the question many businesses were asking was simply, ‘is Zoom safe?’. Many of the initial Zoom cyber security concerns for businesses have since been addressed and rectified, or features have been added to combat them.

Read more

The Importance of Cyber Security in Business

The importance of cyber security is not to be underestimated by any business, no matter the size. But what is cyber security? And, are you aware of the cyber security basics that can keep your company safe? We answer both of these questions, discussing the different types of cyber protection needed to ensure your company […]

Read more

How to Prevent Smishing

Smishing is a type of phishing that has been around for a long time but has become more prevalent and dangerous in recent years. We’re taking a look at what a smishing text is and how to prevent smishing from being dangerous to you. What Is a Smishing Text? Most people have heard of phishing […]

Read more

Office 365 Email Protection: Hidden Costs

There’s a popular misconception that any cloud solution provides everything your business needs, and you no longer need to worry about anything to do with your IT. Whilst cloud services, including Microsoft 365 email, do take away a lot of your pain in terms of having to buy servers and run expensive infrastructure in your […]

Read more

Cybersecurity for Remote Workers

It looks like working from home is here to stay to some extent for the foreseeable future, which means that cybersecurity for remote workers is more important than ever. With over 70% of people working from home at least once per week, if you aren’t already paying close attention to the cybersecurity risks of working […]

Read more

What Is Patch Management?

Currently, 57% of data breaches are attributed to poor patch management. This means that over half of data breaches are entirely preventable, but what is patch management? We’re going to take a look at what patch management is, the different types and importance of hardware and software patch management, and some handy advice for business […]

Read more

How Can You Spot a Phishing Email? The DAC Method

Any business can be targeted by a phishing attack, and most will be at some point, so it’s vital that you and your staff know how you can spot a phishing email. We know of a business that recently lost £22,000 to a phishing attack, and the scams are becoming more complex every day.

Read more