lead-forensics

Cyber Threats and Attack Prevention

Don’t think your business is a target? Think again
Cyber Threats and Attack Prevention  |  8th February 2024

Don’t think your business is a target? Think again


Don’t think your business is a target? Think again You might think that cyber criminals are only interested in large companies or those with...

Read more
Free log in password sign on illustration
Cyber Threats and Attack Prevention  |  31st December 2023

What Is the Most Secure Way to Share Passwords with Employees?


Breached or stolen passwords are the bane of any organization’s cybersecurity. Passwords cause over 80% of data breaches. Hackers get in using...

Read more
Free cybersecurity digital security illustration
Cyber Threats and Attack Prevention  |  25th December 2023

How to Organize Your Cybersecurity Strategy into Left and Right of Boom


In the pulsating digital landscape, every click and keystroke echoes through cyberspace. The battle for data security rages on. Businesses stand as...

Read more
Free malware ransomware scam vector
Cyber Threats and Attack Prevention  |  20th November 2023

Watch Out for Ransomware Pretending to Be a Windows Update!


Imagine you’re working away on your PC and see a Windows update prompt. Instead of ignoring it, you take action. After all, you want to keep your...

Read more
Free Round Grey Speaker On Brown Board Stock Photo
Cyber Threats and Attack Prevention  |  10th November 2023

How to Keep Your Smart Home from Turning Against You


Smart homes have become a ubiquitous part of modern living. It doesn’t even seem unusual anymore to tell your refrigerator to add milk to the...

Read more
MacBook Pro turned-on
Cyber Threats and Attack Prevention  |  31st October 2023

What Is SaaS Ransomware & How Can You Defend Against It?


Software-as-a-Service (SaaS) has revolutionized the way businesses operate. It offers convenience, scalability, and efficiency. No more dragging...

Read more
Cyber Threats and Attack Prevention  |  5th October 2023

That phishing site? Gone in 600 seconds


Did you know that a staggering 60% of phishing websites are only online for a fleeting 10 minutes? Yes, you read that right. Just ten...

Read more
Cyber Threats and Attack Prevention  |  21st September 2023

Beware these “too good to be true” Facebook ads


We’ve all been there. You’re scrolling through your Facebook feed, and an ad pops up promising to help you grow your business with some...

Read more
Cyber Threats and Attack Prevention  |  20th July 2023

Scary stat: 87% of businesses hit by this in the last year


You may think that cyber attacks only happen to large corporations. But unfortunately, that’s not the case. According to a recent report,...

Read more
Cyber Threats and Attack Prevention  |  13th July 2023

This is the latest trend in phishing attacks


Have you heard the saying, “A picture is worth a thousand words”? It seems cyber criminals have too, and they’re using it to their...

Read more
Cyber Threats and Attack Prevention  |  6th July 2023

Privacy alert: Change this setting in Edge, now


Don’t be mistaken, we love Microsoft Edge (and think you will too), but lately, something has come to our attention that we wanted to...

Read more

Charging in public places? Watch out for “juice jacking”


Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the...

Read more
CyberEssentialsSecureConfiguration
Cyber Threats and Attack Prevention  |  18th February 2022

The Five Controls of Cyber Essentials – Secure Configuration


The second of the five controls we are going to explore is Secure Configuration. This involves making device and software settings as secure as...

Read more
Stay informed

Want to hear from us?

We won’t fill your inbox with spam – but we will send out a short newsletter once a month (or less) with news and updates.