Ultimately all businesses need a way to securely connect their users – employees, partners, contractors, customers – to the right applications at the... Read more
With an increasing demand for flexible, mobile, and location-independent work environments, organisations have to adjust and take advantage of cloud... Read more
‘Data visibility’ and ‘Data Loss’ are two of the prevailing challenges for organisations into 2021 and beyond thanks to the upsurge of a dispersed... Read more
The Trojan Horse story is well-known, with the old saying – beware of Greeks bearing gifts. Trojan computer viruses take their name from the hollow... Read more
This blog is the final part of three in our blog series on DMARC. Read more
This blog is part two of three in our blog series on DMARC. Now that you know the basics of Domain-Based Message Authentification Reporting and... Read more
This blog is part one of three in our blog series on DMARC. We've all received an email that looks like it's from an employee or client, but upon... Read more
On Wednesday 14th of April, Matthew Johnson, one of our senior security consultants released details of a new wireless-based attack dubbed... Read more
To be “slow and low” is an Advanced Persistent Threat (APT) signature. Unnoticed, they penetrate security walls and find their way into networks and... Read more
What used to be an internet oddity has developed into a widely destructive political and social force: Deepfakes. They have become one of the most... Read more