A new naming system for hackers planned by Microsoft

Imagine trying to follow a movie where the villain goes by four different names. It would be a bit confusing to say the least. That’s what it’s like in the cyber security world right now. A hacking group could be referred to by completely different names, by those who report and write about them.

Read more

PowerPoint slides just got a whole lot easier

PowerPoint presentations are still a key part of business meetings. But they can be time consuming, and a real pain to create. How often do you find yourself staring at a blank PowerPoint slide? Trying to figure out how to turn your notes into something presentable.

Read more

Beware: Is that really from Microsoft?

Most of us are pretty trusting of emails from Microsoft and often open them without thinking twice. Putting our confidence in the fact that they’re one of the biggest tech companies in the world. But what if that email isn’t really from Microsoft? Cyber criminals often exploit trust like this to trick people.

Read more

The BEST way to protect against ransomware

These days there’s no shortage of cyber threats keeping businesses on their toes. And ranking up the top, would have to be ransomware. How would you deal with all your files being locked up, encrypted and held for ransom by cyber criminals? With no guarantee that you’ll recover your files, even if you give in […]

Read more

Essential Cybersecurity Best Practices to Protect Your Business from Cyberattacks

You can implement all the most expensive and advanced cybersecurity tools on the market, but if you’re not following cybersecurity best practices, you’re still very much vulnerable to cyberattacks. Human error remains the leading cause of data breaches, so you need to ensure that your entire workforce follows best practices, such as cybersecurity do’s and […]

Read more

Top Cybersecurity Threats Facing Small Businesses in 2024

Running a business means inevitably dealing with all kinds of data. Even if you’re a small or medium-sized business (SMB), you handle customer information, payment details, and even trade secrets. These things are gold for cybercriminals, and leaving your systems unguarded is akin to leaving your front door unlocked with a pile of cash sitting […]

Read more

Cyber-security equals trust: The importance of proactivity when protecting client data

For today’s businesses, proactively detecting and responding to cyber threats is essential in building and maintaining trust amongst clients, peers and wider industries. In this first of three articles on identifying, managing and responding to a cyber breach, we’ll discuss the most common challenges businesses may experience when reviewing their cyber security, starting with the […]

Read more