Home
The Cyber Security Partner for the Small and Medium Enterprise (SME) Cyber Security has an image of being technologically complicated...
Services
Services Assess and Advise We will carry out an assessment of the cyber risks you face and the effectiveness of...
Assess/Advise
Assess/Advise We will carry out an assessment of the cyber risks you face and the effectiveness of your current security...
Design/Certify
Design/Certify We will work with you to design, develop and implement appropriate, cost-effective controls to manage cyber risks. If you...
Optimise/Lead
Optimise/Lead Organisations do not always have the required resource or expertise in-house to design, build, deploy or manage cyber security...
Teaching your Nanna about Cyber Security
By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
Users – The Weakest Link in Business Security Systems?
By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
Is it Safe to use Serverless Applications?
By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they...
So, What’s Phishing?
By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
MageCart attack
By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...