Security
AI: cybersecurity friend or foe?Scott Brooks, Technical Strategist at IT solutions provider Cheeky Munkey, shares his expertise. As artificial intelligence (AI) rapidly becomes more widely used, people are questioning…
read moreBackup
What is endpoint protection?What is endpoint security? Endpoint protection, or endpoint security, is the practice of securing endpoints (or entry points) of an end-users device from being exploited…
read moreSecurity
The top 10 cybersecurity threatsCybersecurity threats have been on the rise over the past few years – evolving in vector and complexity. Changes in business landscapes, including remote working…
read moreSecurity
Passwordless AccessYou must phase out passwords. 20% of security breaches, according to IBM, are the result of compromised credentials. Without a question, the market is indicating…
read moreCyber Attack
Protect your organisation from MalwareDid you know there are over 1 billion malware viruses infecting workstations and networks globally? It is no wonder that so many cyberattacks occur every…
read moreCyber Attack
Cybersecurity MythbustingDid you know that 63% of UK CEOs are concerned about how cyber threats could harm their ability to sell good and services? – PwC….
read moreCyber Attack
FAQ’s for SMB CybersecurityIn this blog we will answer some of the FAQ’s related to SMB cybersecurity. In the past couple of years hybrid working has taken over….
read moreCyber Attack
How Employees can reduce cybersecurity riskBusinesses across all industries are constantly at risk of falling victim to a cyberattack. In order to reduce this risk, it is essential that businesses…
read moreCyber Attack
The role passwords play in a world of cybercrimeFor businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are…
read moreCyber Attack
Ukrainian Malware Attacks: Fake Ransomware ExplainedOn January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware attacks within the Ukraine. The Ukraine government has evidence that a…
read more