Hackers?...Stopped! Understanding the Criminal’s Secrets

Your cyber security is only as strong as the weakest link in your defence. Unfortunately for organisations such as EasyJet, Facebook and Marriott Hotels, gaps in their security have resulted in major cyber breaches,

Restrict user privileges

Restrict user privileges to reduce the insider threat

Of the many cyber threats facing organisations, the one that should not be overlooked is the “insider threat”.  

What is Phishing

What is Phishing and How to Prevent it

We’ve all heard about the shocking rise of successful data breaches in companies of all sizes. In this blog post, we take a look at what social engineering and phishing are and provide tips on how to protect your business from falling victim to these scams.

cyber protection

Cyber protection: Preventing business paralysis

Despite insurers and brokers remaining committed to helping businesses protect themselves effectively, cyber insurance continues to remain a paradox.

Two Factor Authentication

Two Factor Authentication (2FA)

2FA is an essential security layer to make hackers’ lives much more difficult. Passwords are a basic form of authentication but as we know they are not perfect.