Security

Help and ramblings from the Cheeky Munkey team

Cyber Attack

FAQ’s for SMB Cybersecurity

In this blog we will answer some of the FAQ’s related to SMB cybersecurity. In the past couple of years hybrid working has taken over….

read more

Cyber Attack

How Employees can reduce cybersecurity risk

Businesses across all industries are constantly at risk of falling victim to a cyberattack. In order to reduce this risk, it is essential that businesses…

read more

Cyber Attack

The role passwords play in a world of cybercrime

For businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are…

read more

Cyber Attack

Ukrainian Malware Attacks: Fake Ransomware Explained

On January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware attacks within the Ukraine. The Ukraine government has evidence that a…

read more

IT Support

Hybrid Working: What’s Next for Hybrid Work in 2022

A recent study found that hybrid work models are used by 63% of high-growth companies and are the preferred model for 83% of their employees….

read more

IT Support

Key Cybersecurity Considerations for the Construction Sector

Recent advancements in technology have led to a myriad of benefits for businesses over the past two decades. A good example is the construction industry…

read more

IT Support

How to respond to a cyberattack

4 in 10 businesses reported a form of cyber-attack or breach between 2020 and 2021. Consequently, businesses are now investing heavily in cyber security to…

read more

Cyber Attack

cybersecurity threats that are overlooked by businesses

The landscape of cyber threats is constantly evolving. Between August 2020 and August 2021, ransomware attacks increased by 64%. No organisation is immune to falling…

read more

Cloud Services

How Azure Virtual Desktop can improve your security posture

When employees work from an office it is easier to manage the environment as it is consistent and has more defined boundaries. One of the…

read more

IT Support

Pretexting & How To Protect Against Social Engineering Attacks

There are so many cyber-attack methods to be aware of now including cracking passwords, hacking computers and exploiting software. However, when businesses are trying to…

read more