top of page


Protecting vulnerable data in the care sector
The care sector holds a lot of sensitive data and protecting it comes with a unique set of challenges.
Jul 9, 20243 min read
15 views


Harnessing AI Safely: Navigating the Cybersecurity Landscape
AI is raising a lot of questions, from how to navigate it to AI’s impact on cybersecurity. We share how to use AI safely here.
Jun 25, 20244 min read
38 views


Booking holidays? Make sure you’re not falling for scams
Have you heard of the Booking.com scam? We explain what it is, and most importantly, how you can avoid it.
Jun 17, 20244 min read
31 views


Protect your finances: Be aware of BACS scams
What are BACS scams and how can you avoid them? We show you a real-life example and actionable steps you can take to protect your finances.
May 14, 20243 min read
551 views


Cybersecurity anxious? It's not as scary as you may think
In the digital age, it's easy to feel a little bit jittery about the security of our online lives . We're constantly bombarded with...
Apr 2, 20244 min read
528 views


How to make sure you swipe left on romance fraud!
In the digital age, finding love online has become pretty commonplace. With the swipe of a finger, you can connect with potential...
Feb 26, 20243 min read
50 views


Why diversity in cybersecurity matters
The importance of diversity within the cybersecurity industry cannot be overstated. Beyond being a buzzword, diversity in cybersecurity...
Feb 2, 20242 min read
80 views


What is the impact of AI on cybercrime and cybersecurity?
AI is becoming increasingly commonplace in businesses and organisations of all sizes; and with its multitude of capabilities,...
Dec 12, 20234 min read
101 views


Individual Internet Discovery: Internet Profile and Threat Assessment for Your SME
In the digital age, safeguarding your SME goes beyond traditional security measures. Often small businesses don’t believe they need to...
Nov 21, 20232 min read
36 views


Some thoughts from Zephi, a new member with the WMCRC - How To Spot A Spam Email
It’s very common for email inboxes to be inundated with a flood of messages, ranging from important work emails to promotional offers...
Oct 3, 20234 min read
44 views


How Cyber Secure Are Your Internal Systems?
Technology is advancing faster than ever and whilst that presents businesses with a whole host of new and exciting opportunities, it has...
Sep 26, 20233 min read
51 views


How Does Corporate Internet Discovery Protect Your Online Reputation?
In today's world where everything has become digitalised and information is freely spread, a company's reputation can be both its...
Aug 18, 20233 min read
30 views


Why Your Company Might Need Security Awareness Training
The internet is a fantastic resource that has offered countless opportunities to many businesses, however it has also opened the doors to...
Aug 8, 20233 min read
83 views


What is Cyber PATH?
The digital landscape has evolved rapidly, giving rise to a whole new type of crime – cybercrime. The need for cyber resilience is vital,...
Jul 26, 20233 min read
100 views


What is Business Email Compromise (BEC)?
In today's digital world, business communication is often done via email. It offers an easy way to quickly communicate and gives you an...
Jul 12, 20234 min read
65 views


Why could Google's zip domains pose a cybersecurity risk?
On the 3rd May, Google made one of its most controversial moves yet by opting to put .zip domains on sale. Eight new top-level domains...
Jun 26, 20233 min read
57 views


Gift voucher scams: the importance of verification
It’s becoming increasingly clear that we need to be more careful than ever about online scams. Although it's not a subject we discuss...
Jun 26, 20233 min read
70 views


The critical importance of cyber insurance
Nobody likes to think about insurance until they must, but it’s been a key factor in business resilience for many centuries. It remains...
Jun 19, 20233 min read
37 views


Recruiters: are you aware of digital dangers?
As the job market evolves and the demand for niche skills rises, recruiters play a pivotal role in bridging the gap between job seekers...
May 25, 20233 min read
35 views


HR consultants; are you complying with cyber security?
If you’re a Human Resources (HR) consultant, you’re responsible for managing an extensive range of sensitive data. This includes personal...
May 10, 20233 min read
81 views

Latest News
bottom of page