Related Posts

  • Security
  • Jan

The perils of the dark web

The dark web has become an increasingly dangerous playground for those out to exploit vulnerable sys

Read More
  • Security
  • Jan

Are passwords fit for purpose in 2023?

It's no secret that passwords are a daily part of our online life. But as technology advances ever f

Read More
  • Security
  • Jan

Cyber security in 2023

2023 brings with it a new year and a fresh 12 months - but with it comes a wave of new threats. How

Read More
  • Security
  • Jan

Can AI Play A Part In Fighting Cyber Crime?

Thanks to platforms such as ChatGPT, AI has become more influential in 2023. But could it play a new

Read More
  • Security
  • Jan

Can Technology Help Unlock Your Potential?

Businesses seek ways to get ahead of the competition in a constantly changing world. Could the answe

Read More
  • Security
  • Jan

Five problems an MSP can help you with

Are you an IT expert looking for ways to maximise your effectiveness and expand the services you can

Read More
  • Security
  • Jan

The security threats businesses should be aware of in 2023

2023 is on the way, and with it comes the promise of new and emerging threats for businesses and ind

Read More
  • Security
  • Jan

Does your business need a managed service security provider?

As the importance of business information security continues to grow, companies must ensure that the

Read More
  • Security
  • Jan

Reacting to a breach

Sometimes, it doesn't matter how much you spend on defences - all it takes is one errant click or la

Read More
  • Security
  • Jan

How secure is your smartphone?

Smartphones are everywhere we look - and the chances are, you might even be reading this on one now.

Read More
  • Security
  • Jan

Be wary of phishing attacks

When news stories get dominated by the same topic, we can all become fixated on learning more about

Read More
  • Security
  • Jan

Is it time for a cyber security check-up?

Cyber threats are becoming increasingly prevalent, and we should all be concerned. But, just how sec

Read More
  • Security
  • Jan

Multi-Factor Authentication Bypasses: What You Need To Know

Multi-Factor Authentication is, for some organisations, the only thing standing between them and cyb

Read More
  • Security
  • Jan

How Secure Are Your Business Apps?

During the pandemic, business applications such as Zoom and Teams became necessities - but just how

Read More
  • Security
  • Jan

Is your website safe from cyber criminals?

In an always-on world, your website acts as your digital shop window. But, as your most exposed asse

Read More
  • Security
  • Jan

Ransomware: On The Rise!

Ransomware hit record highs in Q1 of 2022, meaning we should all be cautious. But are you a target,

Read More
  • Security
  • Jan

Are Your Passwords Up For Sale?

Malicious outsiders are trying to steal your password. From accessing your accounts to selling them

Read More
  • Security
  • Jan

Passkeys: The Death of Passwords?

At the WWDC 2022, Apple announced the launch of the Google and Microsoft backed passkeys - but what

Read More
  • Security
  • Jan

Smartphones and Smarter Scams

The power of smartphones has changed the world. But, as technology advances, so too does the level o

Read More
  • Security
  • Jan

How Do I Ensure My Staff are Cyber Secure?

Staff are the backbone of any organisation, and as they're privy to sensitive information, financial

Read More
  • Security
  • Jan

Phishing: What Is It and Why Does It Matter?

Phishing attacks are on the rise, with the Ukraine conflict being the latest lure for malicious outs

Read More
  • Security
  • Jan

Do You Need Cyber Insurance?

When you think of the cyber world, you may associate it with the dangers out there. So, if a disaste

Read More
  • Security
  • Jan

Top 5 Tips on Staying Cyber Secure

In light of recent global events, companies globally are being put on alert. With the added risks to

Read More
  • Security
  • Jan

Your Cyber Hygiene in 2022

2022 is upon us. So it's perhaps fitting that we look at new starts and approaches. Given the last f

Read More
  • Security
  • Jan

Is Blockchain the Answer to Cyber Security?

Global cyber attacks and information leaks have been on the rise, as hackers are becoming more and m

Read More
  • Security
  • Jan

Cyber Security or Risk Management?

There really is no escaping the internet or the need to be secure online these days, especially as w

Read More
  • Security
  • Jan

Cyber Security at Christmas

Andy Williams famously sang that Christmas is 'the most wonderful time of the year', but as we colle

Read More
  • Security
  • Jan

Cyber Security: Too big of a threat to tackle alone?

Attacks are going to grow in frequency as threats evolve. Does this mean that the threat of cyber at

Read More
  • Security
  • Jan

World Password Day – Is my password secure enough?

On World Password Day, we take a look at some of the steps you should be taking to help secure your

Read More
  • Security
  • Jan

Threats are evolving, but has your security stood still?

Traditional anti-virus products have done a great job of protecting businesses in the past, however

Read More
  • Security
  • Jan

The Property Sector: Cyber crime’s next target?

Commercially, the property sector is one of the most lucrative industries in the world. But, what's

Read More
  • Security
  • Jan

Is your organisation exposed on the dark web?

Cyber security has been at the forefront of our conversations with most of our partners over the las

Read More
  • Security
  • Jan

The Indisputable Benefits of Cyber Security Awareness Training

It is difficult to overstate the extent of the challenge that small and medium enterprises face in m

Read More
  • Security
  • Jan

Crisis Management and Emergency Planning: Are you Fully Prepared?

The outbreak of COVID-19 has forced many businesses into a level of crisis and emergency response th

Read More
  • Security
  • Jan

10 Top Tips about Security Awareness for Businesses

Cyber security awareness training is a critical element that every business should take seriously. T

Read More
  • Security
  • Jan

Why More Cyber Security Experts Should be in the Boardroom in All Sectors

Cyber security has never been as vital as it is now. Companies, even the ones that pride themselves

Read More
  • Security
  • Jan

Cyber Security Within the Retail Sector – How to Ensure You Remain Secure

Modern consumers are increasingly concerned about the data they provide to online retailers and how

Read More
  • Security
  • Jan

The Rise of Social Engineering Attacks and Why You Must Be Vigilant

Cyber security threats of all kinds are on the rise, but as individuals and businesses become more a

Read More
  • Security
  • Jan

Why You Should Take Your Cyber Security Seriously

If it feels like you are seeing cyber security issues in the news almost every single day, it is bec

Read More
  • Security
  • Jan

Thanks for having us Legalex!

We recently spent a few days out of office to participate at Legalex Cyber Security Expo at the Lond

Read More
  • Security
  • Jan

Fifosys @ Legalex in 2018!

For the first time in 2018, Legal Cyber Security will be running within Legalex. Legal Cyber Securit

Read More
  • Security
  • Jan

Three basic steps to protect your data

Cyber Security Centre race to prepare for future cyber-attacks. How protected is your Data?

Read More
  • Security
  • Jan

Your business could face £17m fines for inadequate cyber security

UK Businesses could lose 4% of global turnover for negligence in modernizing their cyber security de

Read More
  • Security
  • Jan

Ransomware Worldwide - Who is at fault?

Ransomware spreads worldwide and the blame game is in full swing. Jeremy Hunt warned the NHS in 2016

Read More
  • Security
  • Jan

Preventing Ransomware is easier than removing it

Malicious software hit Britain’s National Health Service as well as companies in Russia, Spain, Ukra

Read More
  • Security
  • Jan

Can your business cope with a cyber attack?

If national institutions in the UK can so easily be hit by ransomware described by Marcus Hutchins a

Read More
  • Security
  • Jan

The Need for Offensive and Defensive IT support

Ransomware recently infiltrated universities, railway companies, car factories and government depart

Read More
  • Security
  • Jan

Hackers can Access your data

Online criminals access your IT Infrastructure with the use of problem solving skills. With every ha

Read More
  • Security
  • Jan

Be smart. Update your operating systems.

Like Predators watching hordes of prey for hours on end. They eye up the weak. Patiently waiting bef

Read More
  • Security
  • Jan

Are your remote workers putting your business at risk?

How often do your staff work remotely? How secure is their internet connection?

Read More
  • Security
  • Jan

5 simple ways you can mitigate social cyber threats

Social threats like identity theft, social engineering, phishing, vishing, smishing, scams, cons, do

Read More
  • Security
  • Jan

Automate the pain away - Automate your patch management with Fifosys!

Keeping up to date with the latest security patches for your end-user environment is of huge importa

Read More
  • Security
  • Jan

The importance of encryption

Smart decisions relating to privacy and security are made when decision maker's have a grasp of how

Read More
  • Security
  • Jan

Will GDPR change the way content censorship is regulated in the UK?

Internet censorship isn't exclusive to places in the middle and far east like Iran and China. It exi

Read More
  • Security
  • Jan

Hackers are attacking your WiFi - Here's how to protect yourself

The latest severe security vulnerability was made public yesterday. It’s crucial you’re all aware so

Read More
  • Security
  • Jan

Is the decision to weaken encryption too technical for those in power?

If they do get it, a reasonable mind will realise if encryption gets weakened for all - then there i

Read More
  • Security
  • Jan

Here's what you need to know about the Dark Net

A dark net is the everyday term for an encrypted, superimposed internet network which can only be us

Read More
  • Security
  • Jan

How to tell if a website is trying to hack you

However, turning away from anything technical is turning a blind eye to the possibility you could be

Read More
  • Security
  • Jan

The way to protect your business from phishing attacks

Businesses like yours and ours get studied all the time by hacking groups, preparing for a coordinat

Read More
  • Security
  • Jan

People's browser's get hacked all the time.. Here's how they do it

Your adversaries in the cyber sphere pose threats to you and your business in many forms. They have

Read More
  • Security
  • Jan

Strategies cyber criminals use to access your data

Typically a form of malware which seeks to take control of your computer, stealthily encrypting your

Read More
  • Security
  • Jan

"So much malware, what do I do?"

Malware is the common term covering all malicous programs written with the intent of obtaining data

Read More
  • Security
  • Jan

As a business owner, are you aware if..

If your staff possess the know-how to protect your business from cyber criminals? If your systems ar

Read More
  • Security
  • Jan

Pivotal factors that weaken your security

Considering a hacker spends more time contemplating how to penetrate weakened systems and how to ide

Read More
  • Security
  • Jan

The Top 3 things you need to stay safe online

If any of the above were in your top 3 then I have news for you - you are NOT doing the best things

Read More
  • Security
  • Jan

Why you need cyber security - How hackers value your data

How hackers value your data Why would someone want to hack you? What is the point of a hacker taking

Read More
  • Security
  • Jan

Any web app can infect your computer - Here's how to avoid the pitfalls

Most people nowadays are equipped with some form of computing device - laptop, desktop, smartphone o

Read More
  • Security
  • Jan

3 Fundamentals of Security

Building a perimeter of anti-virus applications is not feasible in this digital era as many anti-vir

Read More
  • Security
  • Jan

Which Wins... Security, Privacy Or Anonymity? You decide!

These days, life is like a reality show for all of us. The surge in popularity of social media platf

Read More
  • Security
  • Jan

The Cyber Security Landscape - Understanding the Threats and Mitigating the Risk

If an IT company promises you 100% Security for your data with 0% risk - remember they're 100% takin

Read More
  • Security
  • Jan

The Cyber Security Landscape - To what degree is your business at risk?

It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never

Read More
  • Security
  • Jan

The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  bu

Read More
  • Security
  • Jan

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l

Read More
  • Security
  • Jan

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • Security
  • Jan

Do we value our data enough to protect it?

I’m sure you know yourself. You know your business. Of course you want to protect everything in it,

Read More