Cyber Security Blog
Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.
Has it clicked?
I’m sure by now you have heard the term ‘social engineering’ bounced back and forth but what does it actually mean?
We’re Recruiting
We are recruiting for a network security engineer.
Tech Support Scams and ‘reverse’ social engineering
What happened when Cisco conducted an experiment that involved them following the instructions of a fake tech support company?
New Year, New Threats
Last year saw breaches of many large companies including Ashley Madison and TalkTalk. But if technology is continuing to evolve, then what does this year
2015 round up!
2015 certainly has been a busy one with many projects keeping us on our toes. Hear about our antics in our last blog of the year.
Who’s behind the Mask?
The escalating number of cases this year has shown we need to ensure our wits are about us now more than ever. But are we
Encryption: The key to security?
Since the devastating Paris attacks a few weeks ago, talk has revolved around the need (or not) to encrypt data.
The Aftermath of a Hacking Attack
What actually happens to a small business after they have suffered a breach? Unfortunately, the aftermath of a security breach does not look too pretty.
What’s trending on today’s threat landscape?
This time last year the news of Sony’s data breach was raging hot in the media. But what’s changed since then? How does the threat landscape look
And so it continues…further insight into the TalkTalk attack
The latest news and opinion regarding the TalkTalk hacking.