How to protect yourself against revenge attacks

How to protect yourself against revenge attacks

Imagine an ex-employee, who was fired by your company, takes revenge by hacking into your IT system. They’re able to do this because passwords of systems they had access to have not been changed. Within a few hours they could potentially do significant damage to your...
5 ways to prevent tailgating in your company

5 ways to prevent tailgating in your company

You might not consider tailgating when developing your cybersecurity strategy, however it’s a form of social engineering which takes place in the physical world. It can be a tricky problem to tackle, but there are a few solutions.  What is tailgating? Tailgating is...
Should your business be using a VPN?

Should your business be using a VPN?

Virtual Private Networks (VPN) have been used by big international companies for years. But, as VPN services become more affordable and easy to use, businesses of all sizes can now use them to enhance online security.  What is a VPN? A VPN is an advanced...
How to protect yourself from evil twin attacks

How to protect yourself from evil twin attacks

Evil twin attacks usually occur when using public WiFi. With more people working remotely – perhaps at cafes or libraries – the chances of it happening increase. However, it’s not only public WiFi that can be duplicated, your company’s guest network...