emilyangoldFeb 27, 20234 min readHow to recover from a cyberattackCyberattacks can be incredibly damaging for any company. Even a small-scale attack can cripple certain parts of your organisation, let...
emilyangoldJun 8, 20223 min readBusiness Continuity vs Disaster Recovery: Key similarities and differences At some point, all businesses will experience major disruptions or a disaster that will affect employees and their ability to work. These...
emilyangoldMay 19, 20224 min readWhat can my business do to combat ransomware? From small local businesses to large international enterprises, all businesses are at risk of falling victim to a ransomware attack. For...
emilyangoldMar 1, 20223 min read5 Types of Phishing Attacks (and How to Avoid Them) Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a...
emilyangoldFeb 22, 20223 min readInformation Security vs Cyber Security: Key principles and differencesOver the past two decades technology has advanced rapidly and fundamentally changed the way that businesses function. Whilst this has...
emilyangoldFeb 9, 20224 min readHow to create a comprehensive security ecosystemJust as the way businesses use technology has changed over the past 5 years, so too has the cybersecurity threat landscape. Previously,...