
This Incident Response Guide is a practical resource that helps your business prepare for, manage, and recover from cyber incidents quickly and confidently.
Download
This Cybersecurity Practice eBook, offers comprehensive guidance on building and maintaining a strong cyber resilience strategy for businesses.
Download
This handy operating guide gives you all the tools you need to run your business' own 8-Week Wellbeing Challenge.
Download
In today's fast-paced world, meetings are evolving. Our latest eBook, dives into how technology and innovative practices are transforming the way we collaborate.
Download.jpg)
This comprehensive guide is designed to empower businesses to harness the potential of Copilot through strategic adoption.
Download
Dive deep into the world of Artificial Intelligence, exploring its impact and the future ahead.
Download
This summary contains information for staff on how to stay aware of current cyber security risks and the role they play in keeping data safe.
Download
If you believe that you could conduct your meetings in a more efficient, productive way then our Better Meetings Guide will help.
Download20/11/2024

The CrowdStrike catastrophe that took down 8.5 million Windows PCs and servers in July has left many of Microsoft’s biggest customers looking for answers to make sure that such an event never happens again. Now, Microsoft has some answers in the form of a new Windows Resiliency Initiative that’s designed to improve Windows security and reliability.
Read More11/11/2024

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week.
Read More8/11/2024

End-to-End Encryption (E2EE) is a method of transferring data securely from your device to another person’s device while protecting information from any third parties. Continue reading to learn more about what E2EE does, how it works and the benefits of using E2EE to secure your data.
Read More25/10/2024

The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks contacting employees to assist them with an ongoing spam attack.
Read More29/10/2024

Microsoft is finally adding threaded conversations to its Microsoft Teams communications app. Threaded conversations in Teams won’t arrive until mid-2025, but ahead of that, Microsoft is also combining its separate chats and channels UI inside Teams into a single view.
Read More9/10/2024

Search any of the Gmail support forums online, from social media platforms such as the Gmail subreddit or the official Gmail community help from Google itself, and one question comes up time and time again: my Gmail account has been hacked, how can I recover it?
Read More21/9/2024

Professional social networking site LinkedIn allegedly used data from its users to train its artificial intelligence (AI) models, without alerting users it was doing so. According to reports this week, LinkedIn hadn't refreshed its privacy policy to reflect the fact that it was harvesting user data for AI training purposes.
Read More9/10/2024

Ethical hacker Christopher Hawkins shares the common mistakes he sees people making when accessing the internet in public.
Read More20/9/2024

Microsoft is launching a Windows app for macOS, iOS, iPadOS, web browsers, Android devices, and even Windows PCs. The Windows app is essentially a hub for streaming a copy of Windows from a variety of sources, including Windows 365, Azure Virtual Desktop, Remote Desktop, and more.
Read More