IT Security

No Password Required – The Pros and Cons of Going Passwordless

The shift towards passwordless methods of authentication is slowly gaining momentum as organisations seek to enhance security and improve user experience. But what does this mean in practice and do the potential benefits outweigh the challenges involved? How Does It Work? Passwordless authentication is exactly what the name suggests – authentication that doesn’t rely on […]

No Password Required – The Pros and Cons of Going Passwordless Read More »

Your Own Private Network – How a VPN Can Protect You in More Ways Than One

Since the COVID-19 pandemic, home working has seen a dramatic rise in popularity across almost all business sectors. The increased flexibility that home working offers, coupled with significant savings in travel time and commuting costs means that this phenomenon is here to stay. Whilst home working offers significant benefits to both employees and employers, it

Your Own Private Network – How a VPN Can Protect You in More Ways Than One Read More »

Beware the Sneaky Zipper! How a Tiny Trick in Your URL Can Unzip Trouble

Imagine you receive an email with a link that appears to be from a legitimate source, like Google Drive. The link might say something like “documents.google.com[.]zip” – notice the extra dot and “zip” at the end. This seemingly minor addition is what makes it dangerous. .zip was recently added as a new domain which means

Beware the Sneaky Zipper! How a Tiny Trick in Your URL Can Unzip Trouble Read More »

Millions Exposed: Ticketmaster & Santander Hacks – How to Protect Yourself

Ticketmaster and Santander bank recently suffered major data breaches, potentially impacting over 590 million customers. While the source of the attack is debated, experts warn it highlights the dangers of interconnected systems. What data was exposed?Reports suggest hackers gained access to 30 million people’s bank account details, 6 million account numbers and balances, 28 million

Millions Exposed: Ticketmaster & Santander Hacks – How to Protect Yourself Read More »

Cloud Backup – A Guardian Angel for Your Data

How can you protect your precious data? In today’s digital world, our data is more valuable than ever. Businesses now hold the majority of their data in a digital format and we as individuals also generate a huge amount of data over our lifetimes, including photos and media files. These files don’t just hold immense

Cloud Backup – A Guardian Angel for Your Data Read More »

Block Out the Noise: Why Ad Blockers are Essential in 2024

Fed Up with Online Ads? Imagine you’re trying to read a recipe online. You’re following along, picturing that delicious cake, when suddenly… BAM! A giant ad for the latest vacuum cleaner blocks half the screen. You close it, but then another ad pops up, this time for shoes you never clicked on. Sound familiar? This

Block Out the Noise: Why Ad Blockers are Essential in 2024 Read More »

The Digital Journey – What Lies Ahead for Adult Social Care?

A New Future Beckons: How Digital Tools are Reshaping Adult Social Care The landscape of adult social care is on the cusp of a transformative journey, propelled by the ever-evolving world of digital tools. As our population ages and the demand for high-quality care intensifies, we’re witnessing a move from traditional models towards a future

The Digital Journey – What Lies Ahead for Adult Social Care? Read More »

The Importance of Cyber Essentials Certification

What is it and why does it matter? In the age of digital dominance, where data reigns supreme and cyber threats lurk around every corner, UK businesses must take steps to mitigate their vulnerabilities. One vital step that organisations can take to help protect themselves is the acquisition of Cyber Essentials Certification, a government-backed scheme

The Importance of Cyber Essentials Certification Read More »

Could a Hacker Guess Your Password?

How strong is your password? A recent report from NordPass contains a list of the most commonly used passwords in the US and 29 other countries. The report shows that people are still frequently using weak passwords like ‘guest,‘123456’, Password1, ‘a1b2c3’ and ‘qwerty’ to protect their accounts. Worryingly, 83% of these passwords can be cracked

Could a Hacker Guess Your Password? Read More »

Mass-Mail Services, DKIM, DMARC & SPF – What’s The Story?

Introduction In October 2023, a major shake-up of email configuration was announced (initially by Google and Yahoo), particularly in relation to its use for mass-mailing services such as Constant Contact, Mailchimp and Hubspot. The issue relates to email authorization changes happening with these service providers, all related to DKIM, DMARC, and SPF. The objective of

Mass-Mail Services, DKIM, DMARC & SPF – What’s The Story? Read More »

2-Factor Authentication – Why does it matter?

Cybercrime is on the rise! Simple and/or outdated security systems are no match for modern threats and attacks. For companies dealing with sensitive data, such as health care organisations, loss of data represents a breach of GDPR, which can have devastating consequences. Unfortunately, it is often the users who are targeted, with their log in

2-Factor Authentication – Why does it matter? Read More »

How Prepared Is Your Business: 5 IT Examples to Improve Your Business Readiness

Business continuity is like a safety net for your company, helping it bounce back and stay operational when unexpected challenges arise. Think of it as a plan to keep your business running smoothly, even during tough times. One crucial aspect of business continuity involves making changes to your IT (Information Technology) systems. Let’s dive into

How Prepared Is Your Business: 5 IT Examples to Improve Your Business Readiness Read More »

Security Threat Report

Once again, the increasing mobility of data in corporate environments is one of the biggest challenges faced in the past year. Users are fully embracing the power to access data from anywhere. The rapid adoption of bring your own device (BYOD) and cloud are really accelerating this trend, and providing new vectors of attack. Furthermore,

Security Threat Report Read More »