top of page
Search

5 Types of Phishing Attacks (and How to Avoid Them)
Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a...
emilyangold
Mar 1, 20223 min read
128 views
0 comments

Legal Tech Trends to Watch this Year
With the nation starting to go back to normality after the pandemic, law firms are looking to adjust to the new norm by looking towards...
emilyangold
Feb 25, 20223 min read
29 views
0 comments

Blue Car Technologies Customer Success Stories - Bech-Bruun
Bech-Bruun is a market-oriented law firm offering a wide range of specialist advisory services to large sections of the Danish corporate...
emilyangold
Feb 23, 20221 min read
50 views
0 comments

Information Security vs Cyber Security: Key principles and differences
Over the past two decades technology has advanced rapidly and fundamentally changed the way that businesses function. Whilst this has...
emilyangold
Feb 22, 20223 min read
23 views
0 comments

How an eSignature solution can support key industries
Businesses in all industries are constantly looking for ways to increase productivity, improve business processes and reduce their...
emilyangold
Feb 16, 20223 min read
29 views
0 comments

How to create a comprehensive security ecosystem
Just as the way businesses use technology has changed over the past 5 years, so too has the cybersecurity threat landscape. Previously,...
emilyangold
Feb 9, 20224 min read
27 views
0 comments

How technology can help businesses retain employees and build a positive company culture
It’s no secret that one of the key factors that contributes to a business’s success is a positive company culture that enables employees...
emilyangold
Feb 7, 20223 min read
14 views
0 comments

4 common digital transformation challenges and how to overcome them
The term ‘digital transformation’ refers to the adoption and integration of digital technologies to transform the way a business...
emilyangold
Feb 7, 20223 min read
24 views
0 comments


A Guide to Hybrid Working Cyber Security
How to keep your business safe from anywhere, on any device. After months of working from home, restrictions have now eased, and many...
emilyangold
Jan 19, 20223 min read
29 views
0 comments


Types of signatures and when to use them
Signatures have been used for thousands of years as a method of proving identity and intent for one or more parties. Although the usage...
emilyangold
Jan 19, 20224 min read
39 views
0 comments

Technology trends that will reshape businesses in 2022
How to make the most of your IT spend. The past two years have been a period of immense change for all businesses, regardless of size or...
emilyangold
Jan 5, 20223 min read
50 views
0 comments
bottom of page