top of page
Search

emilyangold
Feb 27, 20234 min read
How to recover from a cyberattack
Cyberattacks can be incredibly damaging for any company. Even a small-scale attack can cripple certain parts of your organisation, let...
43 views
0 comments


emilyangold
Jun 8, 20223 min read
Business Continuity vs Disaster Recovery: Key similarities and differences
At some point, all businesses will experience major disruptions or a disaster that will affect employees and their ability to work. These...
108 views
0 comments


emilyangold
May 19, 20224 min read
What can my business do to combat ransomware?
From small local businesses to large international enterprises, all businesses are at risk of falling victim to a ransomware attack. For...
61 views
0 comments

emilyangold
Mar 1, 20223 min read
5 Types of Phishing Attacks (and How to Avoid Them)
Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a...
128 views
0 comments

emilyangold
Feb 22, 20223 min read
Information Security vs Cyber Security: Key principles and differences
Over the past two decades technology has advanced rapidly and fundamentally changed the way that businesses function. Whilst this has...
23 views
0 comments

emilyangold
Feb 9, 20224 min read
How to create a comprehensive security ecosystem
Just as the way businesses use technology has changed over the past 5 years, so too has the cybersecurity threat landscape. Previously,...
27 views
0 comments
bottom of page