Would your employees fall for a phishing attack? A phishing simulation case study
Your employees are your best form of defence when it comes to cyber security. Undertaking a phishing simulation can help you test and educate your employees to avoid them falling for a phishing scam.
IT Good Practice: Security Checklist
Keeping up with the evolving security landscape is one of the biggest challenges for businesses. Read our IT Security Checklist to help secure and protect your systems.
What to watch out for in 2017: Top IT Themes
No one can deny the pace of change within the world of technology. As we embark on a new year, how will your business face the IT challenges ahead? So you can get the most out of your systems, we’ve prepared a list of the top challenges and IT themes for 2017.
How secure is your email?
Email has become the single most important form of business communication, yet poses the biggest threat to your business. With increasingly sophisticated and difficult to detect cyber-attacks, are you aware of the latest email threats?
Glossary of Email Threats
As 91% of all cyber-attacks start through email, we’ve put together a glossary of email threats to outline the most common attacks your businesses should be aware of.