Mail

What Are SPF, DKIM, And DMARC Records?

In this insight, we look at the popular email authentication…
February 24, 2023/by jon hyde
Hacker

Do Hackers Get Pensions & Sick Pay?

Kaspersky research has shown that hackers are now being recruited…
February 15, 2023/by jon hyde
security

What’s All the Fuss About LastPass?

Following news that hackers have stolen encrypted backups from…
February 9, 2023/by jon hyde
ransomware

Fewer Victims Pay Ransomware, Yet More Victims

Blockchain data platform Chainanalysis has reported that cybercriminals…
January 26, 2023/by jon hyde
smartwatch

Smart Products Have Just 2 Years Of Life

Consumer champion Which? says that high-end smart products may…
January 19, 2023/by jon hyde
cyber security

A Lack Of Cyber Professionals

(ISC)2’s 2022 Cybersecurity Workforce Study has highlighted…
October 28, 2022/by jon hyde

Forget Hacking, What About Tracking?

In this article, we look at the many different ways we are being…
October 17, 2022/by Stacey Hand

What Are ‘BEC Campaigns’?

In this insight, we look at what BEC campaigns are, their characteristics,…
October 17, 2022/by Stacey Hand
cybersecurity

GMA Announces Commitment to Growing Cybersecurity Success by Becoming a Cybersecurity Awareness Month 2022 Champion

Gregory Micallef Associates Limited (GMA) announced this week…
October 6, 2022/by jon hyde
hacker

The Anatomy of a Data Breach: And Four Steps To Protect Your Business

Arguably no phrase has dominated the tech world the last 24…
September 22, 2022/by jon hyde
Lock

Nearly Half of Employees Use Risky Login Practices

A new study by 1Password has revealed that almost half of employees…
September 22, 2022/by jon hyde
lock phone

Sharing Files That Self-Destruct

In this insight, we take a look at some of the many options…
September 15, 2022/by jon hyde