Latest News & Guides

8 Weird & (Not So) Wonderful Cyber Attacks, Vulnerabilities, and Slip-Ups

28th June 2022

8 Weird & (Not So) Wonderful Cyber Attacks, Vulnerabilities, and Slip-Ups

Cyber attacks have now well and truly joined the ranks of “just another risk to deal with in business”. They are no longer an exception to the norm, the threat they pose is the nor

View article
Digital Operational Resilience Act (DORA): Bolstering Cybersecurity

14th August 2023

Digital Operational Resilience Act (DORA): Bolstering Cybersecurity

In the age of technology, cybersecurity is the name of the game in finance. With digital risks on the rise, policymakers are stepping up to safeguard financial institutions against cybe

View article
Enhance Microsoft 365 Security with Huntress Managed Detection and Response (MDR)

27th June 2023

Enhance Microsoft 365 Security with Huntress Managed Detection and Response (MDR)

Huntress Managed Detection and Response (MDR) has a new feature in beta testing, Microsoft 365. With the increasing frequency in cloud-based services, attacks are sneakier and more impa

View article
IT Security Robocop: How AI Can Help in the Fight Against Cybercrime

21st June 2023

IT Security Robocop: How AI Can Help in the Fight Against Cybercrime

You’ve undoubtedly seen some of the recent press about AI; sadly, much of it negative. People are rightly worried about generative AI and how it will impact jobs and creativity - the

View article
5 Worrying Ways AI Could Shape The Future of Cybercrime

15th June 2023

5 Worrying Ways AI Could Shape The Future of Cybercrime

We’ve all seen the scary talk doing the rounds about AI. Yet we believe that forewarned is forearmed when it comes to cybersecurity. That’s why, instead of adding to the usual media

View article
5 Modern Cyber Threats That Were Unthinkable Just a Decade Ago

2nd May 2023

5 Modern Cyber Threats That Were Unthinkable Just a Decade Ago

Nowadays, technology moves a mile a minute - or faster! Yet as the cyber security community are all too aware, for all of the exciting, positive advances being made, a negative, seedy u

View article
Outsmart the Hackers: How to Create a Great Password Policy

22nd December 2022

Outsmart the Hackers: How to Create a Great Password Policy

When you create a new password, it may pass all of the usual security checks. Lower- and upper-case letters? Tick. Numbers? Tick. Symbols? Tick. But how secure is a password that passe

View article
Can Your Network Vulnerability Scanner Do THIS?!

8th December 2022

Can Your Network Vulnerability Scanner Do THIS?!

Network vulnerability scanning is an essential function in modern corporate cybersecurity. Thankfully, there are a number of network vulnerability scanners out there on the market, all

View article
The End of Antivirus?! Why Managed Detection & Response is the Future

7th December 2022

The End of Antivirus?! Why Managed Detection & Response is the Future

Though it may seem strange for cybersecurity experts to be saying this, we have to ask - “Here, in the 2020s, do we really need traditional antimalware protection as we’ve known it

View article
11 Tips for Leading Cyber Secure Cultural Change in the Workplace

25th October 2022

11 Tips for Leading Cyber Secure Cultural Change in the Workplace

What’s the best cyber security asset that an organisation can have at their disposal? A top of the range next-gen firewall? The latest endpoint protection? Robust managed security?

View article
Pocket Money Protection: 14 Ways to Secure Your Micro Biz on a Budget

2nd August 2022

Pocket Money Protection: 14 Ways to Secure Your Micro Biz on a Budget

Cyber security can be an expensive old game. There’s so much fear and misinformation out there that a worrying number of organisations end up spending over the odds for a level of cyb

View article
The Diary of an Ethical Hacker: The Ice-Queen & The Bluffing Engineer

6th June 2022

The Diary of an Ethical Hacker: The Ice-Queen & The Bluffing Engineer

Withering cyber incidents are frequently in the news. Cybercrime statistics are soaring. We’re all very much aware of the highly unethical cyber attacks that do the rounds.

View article
5 essential steps to protect your business from hackers

28th April 2022

5 essential steps to protect your business from hackers

Sadly, there’s no such thing as a completely watertight IT infrastructure. And even more regretfully, there’s no such thing as an empirically correct or complete list of actions tha

View article
Basic IT asset management: how to reduce cyber risk starting today

26th February 2022

Basic IT asset management: how to reduce cyber risk starting today

“Know yourself” might sound like wishy-washy, Instagram-filtered, self-help claptrap. Yet in reality it’s incredible business advice.

View article
Passwordless authentication: the ultra-secure future of logging in?

1st February 2022

Passwordless authentication: the ultra-secure future of logging in?

Passwords are a real hassle. From your average user’s perspective, you have numerous passwords to remember, many of which you’re forced to change every 30-90 days.

View article
What is Cyber Recon? How criminals try to outsmart the good guys

1st February 2022

What is Cyber Recon? How criminals try to outsmart the good guys

It’s a little uncomfortable to hear, but cybercrime is big business. It has graduated from the gaggle of stereotypical basement-dwelling hackers into a highly profitable – though it

View article
What are insider threats? Definitions, threat types, and prevention guide

19th January 2022

What are insider threats? Definitions, threat types, and prevention guide

There’s a massive misconception in cyber security. Chances are, when you picture a cyber attack, you imagine some shadowy bad guy or gal intricately orchestrating their criminal maste

View article
12 huge small business cyber security misconceptions – debunked!

30th November 2021

12 huge small business cyber security misconceptions – debunked!

All areas of technology are rife with myths, misconceptions, and outright falsehoods. Anything digital is seen as a bit of a dark art to some, which naturally seems to attract rumour an

View article
How to keep your Industrial Control Systems (ICS) cyber secure

22nd October 2021

How to keep your Industrial Control Systems (ICS) cyber secure

Which devices in your workplace are most susceptible to cyber attack? Your PCs? Your smartphones? How about your servers?

View article
What is a persistent threat? How cybercriminals hide in plain sight

24th September 2021

What is a persistent threat? How cybercriminals hide in plain sight

What do you picture when you imagine a cyberattack? You might picture a team member falling victim to a phishing email at a stressful, distracted moment. Maybe you envisage a whole offi

View article
What is Cyber Essentials? All you need to know about certification

22nd July 2021

What is Cyber Essentials? All you need to know about certification

“Cyber Essentials” is a term you hear buzzing around business spaces and techie circles – from LinkedIn, to networking events, and beyond.

View article
What is managed detection and response (MDR)?

21st June 2021

What is managed detection and response (MDR)?

When malware strikes, you need a plan of action, not just alerts. Network firewalls and antivirus software are essential cyber defences, but they aren’t always particularly proactive

View article
3 surprising ways cyber security meets physical security

3rd June 2021

3 surprising ways cyber security meets physical security

True or false: cyber security starts and ends with traditional IT such as PCs, smartphones, laptops, and network hardware?

View article
Why email might be your biggest cyber security weak spot

4th May 2021

Why email might be your biggest cyber security weak spot

Back in 1971 when the first ever email was sent, nobody could have possibly predicted that it would still rule the internet airwaves into the 2020s. Long after social media and messagin

View article
5 surprising ways hackers can get hold of your password

13th April 2021

5 surprising ways hackers can get hold of your password

The power of a good password can’t be underestimated. Thankfully, there are countless tools out there that help you gauge the strength of any password.

View article
Why your whole workplace needs cyber-resilience training

18th February 2021

Why your whole workplace needs cyber-resilience training

High-profile attacks bring cyber security concerns into sharp focus for many of us. However, the headline coverage that these attacks garner belies a concerning truth: that any organisa

View article
21st century Malware: Is your antivirus keeping you safe?

19th January 2021

21st century Malware: Is your antivirus keeping you safe?

With hundreds of new malware strains being released every day, is your antivirus truly prepared for 21st Century threats?

View article
Sophos AV / Intercept X

18th December 2020

Sophos AV / Intercept X

Sophos has been producing antivirus and encryption products for over 30 years. Their cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks

View article
9 cyber threat statistics all small businesses need to see

2nd December 2020

9 cyber threat statistics all small businesses need to see

The internet has well and truly changed how we do business for the better, yet it can be a very dangerous place. It’s easy for providers like us to wax lyrical about the new and excit

View article
11 lessons all SMEs need to learn about Cyber Security

4th December 2020

11 lessons all SMEs need to learn about Cyber Security

Cyber crime is unstoppable. High profile cases involving the likes of the NHS, Sony, and Equifax have made cyber security an especially hot topic.

View article