top of page


Using WhatsApp for business: Is it a good idea?
WhatsApp is everywhere. It’s how we chat with friends, send quick updates, and — more and more — how businesses communicate with...
12 minutes ago4 min read
0 views


How secure are your passwords?
Ever wonder how safe your passwords really are? Well, you’re not alone. Last year, a whopping 35,434 people  reported their email or...
4 days ago3 min read
12 views


Disaster recovery in the cyber supply chain: Is your business prepared?
Let’s imagine a scenario for a second; one of your key suppliers gets hit with a cyberattack. Their systems go down, their data is locked...
Mar 264 min read
41 views


Social engineering and open-source intelligence (OSINT): What you need to know to protect yourself
Sharing personal information online has become a regular part of our daily routines. Whether it's a post on social media , a casual...
Mar 224 min read
76 views


Device security: iOS 18 password app and password managers
Managing passwords can be a bit of a hassle. Many of us have dozens — maybe even hundreds — of online accounts , so remembering your...
Feb 263 min read
26 views


Pineapples and man-in-the-middle attacks (MIM)
Have you ever grabbed your laptop at a coffee shop, connected to the free Wi-Fi, and got to work without a second thought? You’re not...
Feb 53 min read
65 views


How to stay cybersecure whilst working remotely
Remote and hybrid work have become the new normal for many companies around the world. While working from home (or anywhere) offers...
Jan 203 min read
40 views


How to protect your business from BEC attacks: Essential tips and strategies
As we rely more and more on emails, Business Email Compromise (BEC)  attacks are a growing problem, and they can cost businesses time,...
Jan 64 min read
45 views


The rise of deep fake and AI manipulation: What you need to know
Have you ever seen a video of a celebrity saying something outrageous or a politician making a shocking statement that seems too wild to...
Dec 15, 20243 min read
57 views


Cybersecurity on a budget: How Cyber PATH services can help small businesses and charities
Cybersecurity is essential for every organisation, but hiring a professional cybersecurity firm can be incredibly expensive, putting this...
Dec 9, 20243 min read
35 views


Social media hacking: How to safeguard your accounts
Social media has become such a huge part of our lives that it’s easy to forget just how vulnerable we can be on these platforms.  Whether...
Nov 21, 20245 min read
29 views


Test your website security with our First Step Web Assessment
We know that keeping your website secure can feel like an uphill battle. With a barrage of potential cyberattacks looming around every...
Nov 13, 20243 min read
38 views


Train hacking news: The dangers of open networks
If you've watched or read the news recently, you’ll definitely have heard about the recent train hack. The incident has sparked fresh...
Oct 9, 20243 min read
74 views


Beware of QR code fraud: How to protect yourself
QR codes have become a normal part of our daily lives. Whether it’s scanning a code to check a restaurant menu, paying for parking, or...
Sep 26, 20244 min read
43 views


How to ensure that your employees understand common emergency practices, including cybersecurity
As an employer, ensuring that your employees understand common emergency practices is essential for maintaining a safe and...
Sep 26, 20244 min read
32 views


Beyond passwords: The future of Multi-Factor Authentication
We think it’s fair to say that cybersecurity has never been more important . With cyber threats becoming more common and sophisticated,...
Jul 30, 20243 min read
61 views


What are the risks of using personal devices for work?
With the growing trend of remote work  and mobile technology, the lines between personal and professional lives are becoming increasingly...
Jul 24, 20244 min read
141 views


Ensuring operational resilience: Disaster recovery and business continuity in the age of cybercrime
Cybercrime is a growing threat to businesses of all sizes . With more sophisticated attacks like ransomware, phishing, and advanced...
Jul 15, 20243 min read
54 views


Protecting vulnerable data in the care sector
The care sector holds a lot of sensitive data and protecting it comes with a unique set of challenges.
Jul 9, 20243 min read
15 views


Harnessing AI Safely: Navigating the Cybersecurity Landscape
AI is raising a lot of questions, from how to navigate it to AI’s impact on cybersecurity. We share how to use AI safely here.
Jun 25, 20244 min read
38 views

Latest News
bottom of page