Crazy Enough to Work: Outlandish Phishing Techniques
Most businesses are aware of the increasing threat of phishing attacks. Plus, with the shift to remote working, more end-users are exposed, and more likely to fall for..
The Why and How of Managed Print Security
With cyber security, most businesses – quite understandably - tend to focus on computers. But one major security gap businesses overlook is their printers - they can..
What Do Hackers Do With Stolen Data?
A business’s data is typically a lot more valuable than bank details. This is because, as we’ll see below, data can be used for a number of different activities, each..
Is Your Supply Chain Resilient?
The major upheavals of the last couple of decades, such as the global recession and the COVID-19 pandemic, have demonstrated that firms will suffer severe setbacks if..
7 Common Cyber Security Myths Debunked
Cyber Security is one of the biggest risks for businesses currently, as the threat landscape is not just continuously developing, but the attacks are getting more..