logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
[email protected]
+1234567890

Support: 0208 1668 716 | Sales: 0330 1224 420

Follow Us:

Recent Comments

    Malware Tag

    A fishing hook through an email (Phishing Detection)

    There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email. Why has phishing remained such a large threat for so long? Because it continues to work. Scammers evolve...

    Read More

    Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead. For example, Microsoft estimates that up to 80% of the workload in many enterprise organizations is now...

    Read More
    Hacker binary attack code.

    A torn-down virtual infrastructure creates risks for any business. And it can have a significant impact on how quickly you can retrieve your data and resume operations following an attack. These days, many businesses use virtualized infrastructure for more straightforward data storage. It’s because this approach is superior to physical solutions due to enhanced flexibility, straightforward provisioning, and affordable pricing. However, this model also requires a comprehensive...

    Read More
    person typing with keyboard

    While the cyber security of your business should always be a high priority, Russia’s invasion of Ukraine means that businesses may be at an increased risk of cyber-attack. Although there is no direct threat at present, the West is placing a range of sanctions on Russia. There could be retaliation, and Russia has used cyber-attacks in the past. But what does this mean for your business? Advice from...

    Read More
    An online shopper falls for a scam.

    The global pandemic of COVID-19 caused many shops to close and forced people to stay at home more than ever, socialising over Zoom and shopping online. In recent years, there has been an explosion in the growth of internet retailing, with more than half of all UK consumers now shopping online according to retail analysts, GlobalData.   With the UK's online shopping spend forecast to grow 30%...

    Read More
    Cyber Security at Home

    Cyber-crime is very much a huge focus for the media and it is no wonder, seeing as it is the second most reported economic crime affecting 32 per cent of organisations according to the PwC Global Economic Crime Survey 2016. We see regular reports on almost a daily basis of cyber-breaches and attacks on large organisations. However, the issue is certainly not just a problem for multi-national...

    Read More
    Black screen with lots of different addresses in white indicating traffic through a firewall.

    Nowadays, ransomware and cyber attacks have become common threats on the internet. Based on a recent security breach survey by the government and conducted by PWC in 2015 shows that a whooping 90% of large organisations and 74% of small businesses had a security breach, this is an increase on the 2014 and 2013 figures. Furthermore, the average cost to a large organisation started from...

    Read More
    Malware worm sliding over a keyboard.

    The internet has become more and more part of our everyday lives. It has enhanced the way we live and work and made it much easier for people to get information, share and communicate. However with new technology comes security threats such as viruses, worms, spam, malware, spyware and phishing.  These are all types of malicious programs or also known as malware. These malicious programs are human-made...

    Read More
    Cryptowall

    UPDATE: A tool has been published which will let you get the key to unencrypt your files for free. https://www.decryptcryptolocker.com/ This week one of our clients has been infected by Cryptowall. This attack occurred on a laptop protected by McAfee and fully up to date at the time of the attack. In space of 5 hours Cryptowall managed to encrypt users data and data on network...

    Read More