Why you need to protect your organisation from smishing attacks

Have you ever received a text message from a bank or a company asking you to verify your personal information or account details? If you have, you might have been a target of smishing, a type of phishing attack that uses text messages to trick you into divulging sensitive information. Smishing is a growing threat […]

This month in data breaches: February edition

Data breaches are an ever-present threat to organisations. Despite advances in cybersecurity measures, the number of reported data breaches continues to rise yearly. So far, 2023 has continued the pattern. As the calendar flipped to February, several data breaches were reported, including those affecting the NHS, Reddit, Arnold Clark, and Pepsi. Let’s take a closer […]

Free Guide: The Ultimate Guide to Cybersecurity Onboarding

Are you ready to revolutionise your company’s onboarding process and instil a culture of cybersecurity from day one? Look no further than our free guide, “The Ultimate Guide to Cybersecurity Onboarding.” Designed specifically for companies welcoming new staff, this comprehensive resource outlines the importance of cultivating positive cybersecurity behaviours early on and provides invaluable strategies […]

Free Guide: Remarkable Realities: Cybersecurity Edition

Think cybersecurity is dull? Think again! Join us as we dive into some of the weird, wonderful and amazing facts from across the world of cybersecurity. We’ll share some of the barely unbelievable realities surrounding us and show you (and your team!) how it relates to your personal and organisational cybersecurity. In this free guide, […]

What are the cyber risks in the automotive industry?

The automotive industry is, at once, both at the forefront of technological innovation and wedded to old ways of working. There has been a tremendous transformation over recent years, with rapid advancements in technology bringing about connected cars, electric vehicles, and autonomous driving. However, as an industry, many classic ways of working are still in […]

Free Guide: Everything You (And Your Team!) Need to Know About Passwords

Passwords are the backbone of modern Internet security – but that doesn’t mean they’re protecting us. In fact, a shocking number of us exhibit password behaviours that put us (and our companies) at severe risk of a breach! Unlock the secrets to strong password security! Download our free guide, “Everything You (And Your Team!) Need […]

Free Guide: How Organisations Can Create Cyber Superheroes to Take on Cyber-Attacks

When you think of cyber attacks, you might imagine that it’s only tech firms and the banking industry that are targets. However, every organisation in every industry has valuable data to lose. A 148% surge in global ransomware attacks from 2020 to 2021 is testament to that fact. It’s an increase which has led to […]

Free Guide: Everything You Need to Know About Phishing

Ever received an email that seemed a little fishy? You know, those ones that pretend to be from reputable companies but just don’t feel right? Well, these are phishing emails; unfortunately, they’re a genuine concern, especially if you fall victim to one. According to a recent report, phishing and pretexting make up 98% of cyber […]

Free Guide: Developing Your Perfect Training Programme

An effective training programme can be the difference between a breached business and a secure business. Whilst there’s no shortage of training solutions out there, ensuring that you’re getting the most from them is a persistent challenge that every business faces. In this essential free guide, we share what we’ve learned over almost 15 years […]

What your personality type says about your cybersecurity

It’s a digital world, and cybersecurity is now a critical concern for businesses of all sizes. With an increasing number of cyber-attacks hitting organisations of all sizes, it’s imperative for companies to take every available measure to protect their confidential information and sensitive data. While technical measures such as firewalls, antivirus software, and encryption are […]