How Secure is My Office Wi-Fi?

A vulnerable route straight into the system. Earlier this year I sat in a restaurant awaiting a customer, ready to discuss the final details of a project. Habitually, I was…
A vulnerable route straight into the system. Earlier this year I sat in a restaurant awaiting a customer, ready to discuss the final details of a project. Habitually, I was…
"Why did I get infected? I have an antivirus" is quite a common question and a good one. Whoever named the most common method of infection "Trojan Horse" certainly knew…
We all know what bank robbers and burglars do. Understanding their common tools and techniques helps us to design appropriate defence mechanisms. Cyber crime is no different. Recognising the different…
Cyber Essentials (CE) is a government-backed cyber security certification scheme that sets out a baseline of cyber security suitable for all organisations. The scheme's five security controls can prevent “around…
Why are top managers often the targets of cyber criminals? As top managers of SMEs, we expect and demand access to all data within our company. While we may consider…