Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.
Tech Support Scams and ‘reverse’ social engineering
What happened when Cisco conducted an experiment that involved them following the instructions of a fake tech support company?
New Year, New Threats
Last year saw breaches of many large companies including Ashley Madison and TalkTalk. But if technology is continuing to evolve, then what does this year
2015 round up!
2015 certainly has been a busy one with many projects keeping us on our toes. Hear about our antics in our last blog of the year.
Who’s behind the Mask?
The escalating number of cases this year has shown we need to ensure our wits are about us now more than ever. But are we
Encryption: The key to security?
Since the devastating Paris attacks a few weeks ago, talk has revolved around the need (or not) to encrypt data.
The Aftermath of a Hacking Attack
What actually happens to a small business after they have suffered a breach? Unfortunately, the aftermath of a security breach does not look too pretty.
What’s trending on today’s threat landscape?
This time last year the news of Sony’s data breach was raging hot in the media. But what’s changed since then? How does the threat landscape look
And so it continues…further insight into the TalkTalk attack
The latest news and opinion regarding the TalkTalk hacking.
So much TalkTalk about cyber-attacks
The topic concerning many is the latest cyber-attack on telecommunications group TalkTalk which has not just affected the business but has put its 4 million
Smart Security Service Launch
To launch our new security service, Smart Security, we held an event on 15/10/15 at our offices at Brindley Place complete with champagne and canapés