Skip to Content
a laptop cartoon with the text passwords are not enough

Passwords Are Not Enough

Passwords are integral of modern security, used in all areas of everyday life, from shopping for groceries online to system administrators for the most critical national infrastructure...

Learn more
abstract image of a brain and a computer chip

Anatomy of a Penetration Test Part 1: External Infrastructure

Penetration testing — pen testing for short — does not need to be a full-blown simulated cyber attack. In most cases, a pen test focuses on one...

Learn more

SNATCH THEFTS – Protect your Android device in 2025

Given the alarming rise in mobile phone thefts, particularly in crowded areas, it’s essential to take steps to protect your Android device. With thieves often reselling stolen...

Learn more

SNATCH THEFTS – Protect your IPhone in 2025

With the drastic rise in mobile phone “snatch thefts” across the UK, it’s crucial to take pre-emptive measures to secure your iPhone and its data. Staying vigilant...

Learn more
Data Protection

Cyber Hygiene 101: Cleaning Up Your Digital Footprint

In today’s digital age, almost everything we do is connected to the internet. From social media posts to online shopping, our personal and professional lives are increasingly...

Learn more

Social Engineering: The risks and what you can do to stay safe!

Social engineering is the manipulation or deception of individuals into revealing confidential and sensitive information or performing acts that may compromise an organisation’s security. Unlike traditional hacking,...

Learn more

Cyber Essentials Update – The New Willow Self-Assessment Questionnaire

There are now references the Cyber Essentials requirements quoted throughout the assessment. Links are also provided to the Cyber Essentials Knowledge Hub set up by IASME to...

Learn more

Transitioning from Military Service to a Career in Cybersecurity

The Royal Marines After nine rewarding years of service in the Royal Marines, I decided it was time for a new challenge. I sought a career that...

Learn more

ESET Protect Advance vs. ESET Protect Elite: An In-Depth Comparison

In today’s world safeguarding data and ensuring online security is crucial for businesses globally, ESET – a software company specialising in cybersecurity – presents a variety of...

Learn more

Understanding the security risks of Connected Cars

Automotive manufacturers are constantly looking for ways to evolve and improve the driving experience of their vehicles, making them more leisurely for consumers. Remote functions from apps,...

Learn more
Why is Vulnerability Scanning so important?

Why is Vulnerability Scanning so important?

As the Cyber Security threat landscape continues to evolve, the emphasis on regular updates is ever-present, with bad actors looking to exploit any vulnerabilities and gain unauthorised...

Learn more

Online Threats in the Shadows – Why Dark Web Monitoring Matters

In this increasingly digital world, the internet has revolutionised how we conduct business, communicate, and live our lives. Yet, it has also given rise to the hidden...

Learn more