Blog

Remote Working and Keeping Safe

Iain Westwood

Over the years, Remote Access technology has developed to a degree where a lot of businesses can shift from an office-based to a working from home model to allow business continuity in challenging times – as many have done recently in light of the COVID-19 pandemic.

Unfortunately, despite global events, there are still those who will exploit others for financial gain meaning that secure working practices are more important than ever. 

more →

Blog

XSS, SQL injection, and WAF

John Baldock

XSS – Cross-site scripting

XSS is a common form of injection attack on public facing web servers. Any web server can be vulnerable to attack, and websites now are feature-rich with multiple embedded databases, comments sections, and media… all of which increase the vector types that can be attempted by cyber criminals for various reasons.

more →

Blog

Cybersecurity for small businesses

Iain Westwood

The impact of data breaches, network hacks or well-crafted phishing campaigns is often reported in the press.  These reports often cover reputational loss and financial cost to the victim that can run into tens or hundreds of thousands of pounds.  But what about the little guy?

Email attacks

Small businesses can often be the focus of specific targeted email-based attacks.  

more →

Blog

Don’t be the next Travelex!

Iain Westwood

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →

Blog

Cybersecurity Predictions for 2020

Sharon Holland

The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before.  Each year we are seeing more and more challenges in the fight against cybercrime.  With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.

more →