Our stories

example of physical security - guards

Defending your information from physical attacks

Risks to the vital information that you need to run your business, are not just mystery hackers in far-away places stealing your data remotely through a cyber-attack. A physical attack on, or physical threat to your business, could be just as damaging. Whether due to natural disaster, intentional theft, or accidental loss or leakage of information. Physical security protects your ...
phishing awareness showing man with net

Gone Phishing: Nigerian Princes and Easter Eggs 

When was the last time you saw an email from a Nigerian prince, asking you for help in getting access to his fortune? All he needs is your bank account details and/or a small payment from you to cover the costs (taxes, perhaps), and he’ll transfer a share of his fortune to your bank account… It was probably a while ...

Stop, hang up and call 159

Do you know about calling 159? You can call 159 to speak to your bank if someone calls you and:
  • Claims they’re from your bank,
  • Asks you to transfer money or make a payment,
  • And/or wants to talk about your finances and it doesn’t seem right.
If you think someone might be trying to trick you into sending them ...
footprint

Finding the boundaries of your digital footprint

Do you know the digital footprint of your business? It’s probably larger than you think, and may be more important than you think, too. While the digital footprint of your business is core to your brand and reputation, it also extends your ‘attack surface’—by which we mean the vulnerabilities that can be found in your digital environment (hardware and software) ...

Broken Link Hijacking 

You might think of broken links on your website as just a tiresome chore to fix, that you’ll get around to ‘one day’ … but they could become a security risk. No doubt your website links to other web pages and other external resources. Maybe a PDF or two; maybe a video. That’s generally seen as useful for your visitors, ...
usability and security guide the user

Paving the desired path: Usability and Security 

People are just trying to get tasks done. Like a river finding its way to the sea, people will find the easiest way. For example, landscape planners sometimes wait to see where people want to go, revealed by dirt tracks, before paving the paths. So, when you’re designing your product or your process, it’s important to start with the end ...