How to spot and report phishing emails in UK?
Discover what is phishing, how to spot and report phishing email attacks in the UK. Read more about how we are helping organisations secure their assets.
Discover what is phishing, how to spot and report phishing email attacks in the UK. Read more about how we are helping organisations secure their assets.
Discover the different types of malware (and examples) affecting businesses and personal computers worldwide. Get in touch for free advice.
UK’s National cyber security centre (GCHQ) guide to 10 steps to cyber security for organisations. Discover how you can utilise this cyber security checklist.
Understand the state of cyber security in universities discussing threats, threat actors and how to defend your university infrastructure against cyber attacks.
Understand symmetric and asymmetric encryption & advantages. Learn about the use cases and top encryption mistakes that risk user data.
Understand what is HIDS, how is it different from NIDS and advantages and disadvantages. Learn about the attack vectors identified by each of the technologies.
Read about examples of sensitive data, what is sensitive data and how GDPR personal data can be identified and protected. Discover more.
Learn about access control , their types and examples, and how to use it to secure sensitive data. Discover more.
Explore what is an open port and closed port, If port scanning is legal and risks of open ports. Further sub-sections include how to detect and monitor open ports to reduce overall attack surface.
Read about 3 principles of information security and difference between information and cyber security. Further details include basics around security policies and their importance.