Security
What Are ‘BEC Campaigns’?
In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can…
Nearly Half of Employees Use Risky Login Practices
A new study by 1Password has revealed that almost half of employees put their companies at risk…
Sharing Files That Self-Destruct
In this insight, we take a look at some of the many options available for sharing files…
UK Broadband And Mobile Carriers Face Tough New Security Rules
The UK government’s Department for Digital, Culture, Media and Sport has proposed a new set of rules…
Protect Yourself From Job Phishing Scams
In this article, we look at what ‘job phishing’ is, how it works, and how you can…
How Can You Protect Yourself From ‘Identity Theft’?
With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot…
New Windows Feature Displays Which Apps Have Been Listening-In
The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps…
Russia Cautions Cyber Attacks May Start Military Confrontation
The growing number of cyber-attacks since the start of Russia’s war against Ukraine have led The Russian…
New Spy-Spotting App From MI5
The UK government’s MI5-run ‘Centre for the Protection of National Infrastructure’ has launched a new app to…
Apple, Google and Microsoft In Password Collaboration
Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in…









