
What’s All the Fuss About LastPass?
Following news that hackers have stolen encrypted backups from…
February 9, 2023/by jon hyde
Fewer Victims Pay Ransomware, Yet More Victims
Blockchain data platform Chainanalysis has reported that cybercriminals…
January 26, 2023/by jon hyde
Smart Products Have Just 2 Years Of Life
Consumer champion Which? says that high-end smart products may…
January 19, 2023/by jon hyde
A Lack Of Cyber Professionals
(ISC)2’s 2022 Cybersecurity Workforce Study has highlighted…
October 28, 2022/by jon hyde
Forget Hacking, What About Tracking?
In this article, we look at the many different ways we are being…
October 17, 2022/by Stacey Hand
What Are ‘BEC Campaigns’?
In this insight, we look at what BEC campaigns are, their characteristics,…
October 17, 2022/by Stacey Hand
GMA Announces Commitment to Growing Cybersecurity Success by Becoming a Cybersecurity Awareness Month 2022 Champion
Gregory Micallef Associates Limited (GMA) announced this week…
October 6, 2022/by jon hyde
The Anatomy of a Data Breach: And Four Steps To Protect Your Business
Arguably no phrase has dominated the tech world the last 24…
September 22, 2022/by jon hyde
Nearly Half of Employees Use Risky Login Practices
A new study by 1Password has revealed that almost half of employees…
September 22, 2022/by jon hyde
Sharing Files That Self-Destruct
In this insight, we take a look at some of the many options…
September 15, 2022/by jon hyde
UK Broadband And Mobile Carriers Face Tough New Security Rules
The UK government’s Department for Digital, Culture, Media…
September 9, 2022/by jon hyde
The True Cost Of Using Pirated Software
In this article, we look at how the risks to businesses posed…
August 31, 2022/by jon hyde