top of page
Search


emilyangold
Dec 2, 20226 min read
How to Protect your Law Firm from Phishing Attacks
According to recent research by Tessian, 26% of employees have clicked on a phishing email at work in the past year. For this reason, and...
23 views0 comments


emilyangold
May 19, 20224 min read
What can my business do to combat ransomware?
From small local businesses to large international enterprises, all businesses are at risk of falling victim to a ransomware attack. For...
61 views0 comments

emilyangold
Mar 1, 20223 min read
5 Types of Phishing Attacks (and How to Avoid Them)
Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a...
128 views0 comments

emilyangold
Feb 22, 20223 min read
Information Security vs Cyber Security: Key principles and differences
Over the past two decades technology has advanced rapidly and fundamentally changed the way that businesses function. Whilst this has...
23 views0 comments


emilyangold
Jan 19, 20223 min read
A Guide to Hybrid Working Cyber Security
How to keep your business safe from anywhere, on any device. After months of working from home, restrictions have now eased, and many...
29 views0 comments
bottom of page