Why you Should Invest in IT Security Awareness Training Table of Contents Toggle What Does GDPR Mean For IT Security?Avoiding the Most Common Cyber ThreatsKeeping Your Passwords SecureThe Importance of Updates and PatchesDo I Need Security Awareness Training?What’s...
What is Encryption & 4 Reasons you Should be Using it Table of Contents Toggle What is data encryption?Types of encryptionSymmetric encryptionAsymmetric encryptionFour benefits for organisations using data encryption:1. It helps you move into the cloud and stay...
The Dark World of Spam & Phishing – How to Protect Yourself Table of Contents Toggle How spam and phishing scams workViruses, Ransomware and SpywarePhishing scamsSpear-phishing scamsWhat does a spam email or phishing attempt look like?Tips for staying safe...
Your Guide to the Cyber Essentials Certifications Table of Contents Toggle What is the Cyber Essentials scheme?1. Have a firewall installed2. Use secure configurations3. Control user access4. Protect yourself against malware5. Make sure software and devices are...
What is a Firewall and How to Choose the Right one for you Table of Contents Toggle What is a firewall?Why does my organisation need one?Different types of firewallsWhat should I look for in my firewall? When a layperson is asked about cybersecurity, “firewall” is...