Our stories

Thinking of using AI in your business?

You may be thinking of adding AI into your business processes—or you may already have done so. If so, you should put some thought into securing your AI, and into what training your staff may need. In terms of security, you should think about:
  • Protecting the data you will put into AI to prevent it from leaking, or from ...

Do you need cyber insurance?

Do you feel lucky? Well… do you? Cyber insurance can be an extra financial burden on already-stretched small businesses. Some companies think they don’t need it because they spend their money on cyber security tools instead. And certainly, cyber insurance can be a complicated and daunting task if you aren’t accustomed to thinking about your cyber risk. And risk is, ...

Critical friends and information security

You know someone is a good friend if they tell you that you have a smudge on your face, or something in your teeth—ideally before you go into that Zoom meeting. You know someone is a really good friend if they are able to tell you when you are making a mistake or putting yourself in harm’s way. And a ...

Should you pay the ransom?

The National Cyber Security Centre has published new guidance on what to do if you suffer a ransomware attack—and these attacks don’t just happen to big companies. A ransomware attack is likely to be a highly stressful time, and the attackers will put pressure on you to act quickly. If you’ve read the NCSC guidance in advance—maybe downloaded it to ...

Lost and found

Have you ever signed up for a local community group on social media—maybe your local town’s Facebook group or WhatsApp chat? If you have, you’ll have seen that certain topics come up a lot. After lost dogs, injured cats and missed bin collections, it’s usually lost smartphones. A lost smartphone is distressing for the owner of the phone. It can ...

What are you signing up for?

You might have seen recent reports of a man stealing login details from other people on a flight, using an ‘evil twin’ attack. Allegedly, he established a Wi-Fi hotspot that looked very like the one available for in-flight Wi-Fi. This is what the word ‘twin’ refers to in this kind of attack. Typically, this kind of attack is reliant on ...