The CyberFirst Girls Competition was launched on 18 January and we have been inundated…

A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks. Source: Cloud Security Open Databases a Juicy Extortion Target

IP Telephony is a telepphone service delivered over a network connection. Hosted remotely, it has several unique advantages. It allows you to make calls at a fraction of the cost, eliminates the need for any onsite equipment, and allows you to access a range of features that can drive productivity, encourage collaboration, or keep your business safe with a range of security options.

When talking about end-user device security, one of the questions I hear most often…

In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software…

What would life be like without traffic lights, mass-produced food, energy at the…

Email continuity is critical. Learn how to protect email with simple, and old hat, methods in tandem with Exchange Online for email continuity & email disaster recovery. Email continuity & Email Disaster Recovery: I’m not sure if it’s just me, but there does seem to be an incessant whine regarding the demise of email. Usually from […]

As we noted back in November, it’s common knowledge that keeping device software up…

One of the things that I (and many other cyber security people)…