Introducing Cyber as a Service

Posted by David Woodfine on Dec 8, 2021 04:18:00 PM

The ideal solution to deal with your security woes. Ever heard of a successful breach that didn’t take advantage of a vulnerability in a firm’s cyber security posture? Neither have we! Staying one step ahead of cybercriminals is challenging. Once a vulnerability is identified, there is nothing to stop cybercriminals from trying their luck.

Continue reading

Topic mobile Internet mobile security cyber security

​​The Rising Popularity of NFTs and The Rising Security Threat

Posted by David Woodfine on Nov 10, 2021 04:10:00 PM

The art world is known for being ahead of the curve, adopting new and interesting technologies to push the boundaries of what we define art to be. Currently, the hottest pieces to land in the art scene are non-fungible tokens, otherwise known as NFTs, which have grown so much in popularity that people are willing to spend incredible amounts on these intangible assets.

Continue reading

Topic mobile Internet mobile security cyber security

Common Security Incidents

Posted by David Woodfine on Oct 5, 2021 04:03:17 PM

How Much Do You Know About Cyber Security Threats? And Is It Enough? At the moment, it seems like everyone is talking about cyber security, and rightly so! As more companies make the shift towards embracing new tech, like cloud-based services to manage their private data and IT infrastructures, it’s natural that protecting that data is going to be the main concern.

Continue reading

Topic mobile Internet mobile security cyber security

FluidOne’s cyber partners CSA add Lookout Mobile Endpoint Security to growing solutions portfolio

Posted by David Woodfine on Oct 5, 2021 02:49:04 PM

Following the global pandemic, the mass migration to remote working was a necessary move. As things have begun to return to the ‘new normal,’ however, we noticed that many sectors are planning to stick with remote and hybrid models of working and are therefore continuing to rely on the use of mobiles and tablets to routinely access corporate data. However, since iOS, Android and Chrome OS devices...

Continue reading

Topic mobile Internet mobile security cyber security

Is Cyber Training and Education working?

Posted by David Woodfine on Sep 8, 2021 03:56:00 PM

The report from the ICO on the ‘surprising’ decline in personal data breaches has certainly opened up a topic of debate, which clearly leads us to think: is our cyber training and education really working?

Continue reading

Topic mobile Internet mobile security cyber security

Poly Network Hack

Posted by David Woodfine on Aug 13, 2021 03:39:00 PM

On 10th August 2021, Poly Network announced in a tweet that it had been attacked. Not only had their network been breached, but the hacker had transferred enormous sums to their addresses right under Poly Network’s nose.

Continue reading

Topic mobile Internet mobile security cyber security

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Posted by Luke Osborne on Jul 7, 2021 04:38:00 PM

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis, has been caught targeting Microsoft IIS servers by exploiting vulnerabilities. In this blog, we’re taking a look at Sygnia’s Incident Response Team’s report on the current events regarding the threat actors activities, how they do it and more importantly, how you can protect yourself.

Continue reading

Topic mobile Internet mobile security cyber security

The ISDN switch-off: what you need to consider.

Posted by Steve Barratt on Jun 24, 2021 10:36:36 AM

The ISDN switch-off is much sooner than you think, yet as many as 2 million customers still rely on ISDN as their primary connectivity solution. As we power through the five-year switch-off plan, we’ve put together a guide to what you need to consider when choosing and implementing your ISDN alternative.

Continue reading

Topic Home Office Unified Communications working from home EU

Six Tips to Reduce The Risk of a Ransomware Attack

Posted by Dave Woodfine on May 14, 2021 10:20:12 AM

Ransomware is difficult to protect against as the criminals themselves are security experts who carefully review and target their victims. Attackers are becoming increasingly skilled at exploiting vulnerable services and unpatched software, with almost three-quarters of Ransomware attacks managing to successfully encrypt private company data. According to a 2020 survey by Sophos, 51% of...

Continue reading

Topic Home Office working from home ransomware

Is your Microsoft M365 service secure from attackers? Are you sure?

Posted by David Woodfine on Mar 23, 2021 05:40:30 PM

The mass migration to remote working as a result of the coronavirus pandemic has seen many organisations adopt new platforms and applications to remain connected and productive. One popular application is Microsoft M365 thanks to its variety of features that make remote collaborative work simple and accessible.

Continue reading

Topic Home Office Unified Communications working from home EU Brexit Roaming