April 2022 Newsletter
We take look at threat intelligence for dealing with cyber attacks, the cost of email breaches to business, a Microsoft report on the Russia-Ukraine war, Cloudflare blocks the largest attempted HTTPS DDoS attack, and a self-driving car runs from the police.
March 2022 Newsletter
This month we investigate the Lapsus$ cyber attacks, increased cyber attack warnings and crypto scams because of the Russian-Ukraine war, the EU Digital Markets Act, the latest Apple releases… and, we’ve been to Tees Expo.
February 2022 Newsletter
Review the world of ransomware attacks, talk two-factor authentication & multi-factor authentication, listen to government warnings to boost cyber security, warn about subscription traps, celebrate a booming cyber security economy… and we’re going back to Tees Expo
January 2022 Newsletter
We begin the year with a reminder to stay alert for Phishing and Smishing scams, as well as a warning of the uptick in cyber attacks; consider the use of Sharepoint to enhance hybrid working; and, the UK toots it’s horn for a booming Tech sector!
December 2021 Newsletter
The end of year newsletter looks forward to 2022 with Hybrid Working and Hybrid Cloud systems, predicting the tech trends, a reminder to backup your data, getting fit with the help of smart tech, the growth of tech phobias, and taking a look at the government’s planned national cyber strategy.
November 2021 Newsletter
This month’s newsletter brings Christmas tech ideas, and staying safe during online shopping, plus a Budget announcement for tech innovation, Microsoft takes on the Chromebook with Windows 11 & the year’s worst passwords.
October 2021 Newsletter
This month’s newsletter brings Halloween stories of cyber security nightmares, lost laptops & internet of things gone rogue, plus Windows 11 & Halloween tech.
Back to School and Device Protection
With many of our most recent blogs highlighting rapidly increasing numbers of cyber attacks, we’re using this blog to discuss
Responding to Ransomware #3
How bad is it? This is the third article in a series of articles on Ransomware. The first article dealt