BlogCyber Security 101 What to do after a ransomware attack It started as a normal day at work. You send a few emails, drink some…Rob SAugust 9, 2022
BlogIndustryInside CyberSmart CyberSmart joins Kickstart’s new accelerator Another week, another good news story at CyberSmart. We've joined Kickstart’s new accelerator. Here’s what…Rob SAugust 1, 2022
BlogMSP and IT Resellers Why managed service providers (MSPs) are a target for cybercriminals According to security services from the ‘five eyes’ countries – Britain, the US, New Zealand,…Rob SJuly 26, 2022
BlogIndustryInside CyberSmart Double delight as CyberSmart scoops two awards We love an awards ceremony at CyberSmart. It’s a chance to wear long-neglected formal wear,…Rob SJuly 12, 2022
BlogCyber Security 101 New guide: The State of UK SME cybersecurity UK SMEs have faced a turbulent few years. The COVID-19 pandemic altered the way many…Rob SMay 11, 2022
BlogCyber Security 101 7 key takeaways from the DCMS Cybersecurity Breaches Survey 2022 Each year, the Department for Culture, Media and Sport releases its Cybersecurity Breaches Survey. It’s…Rob SMay 4, 2022
BlogCyber Security 101 Why are data backups so important? If you’re at all tuned into the cybersecurity sphere, you may have noticed that 31st…Rob SApril 12, 2022
BlogCyber Security 101 What is a banking trojan and how do you stop one? Zeus, SpyEye, Emotet. What do those names mean to you? If you guessed characters from…Rob SMarch 22, 2022
BlogCyber Security 101 What is a zero-day attack? Provided you’ve read any cybersecurity story in the media recently, you’ve probably come across the…Rob SFebruary 15, 2022
BlogCyber Security 101 What is multi-factor authentication? When you sign in to an online account, you’re asked to prove your identity (a…Rob SFebruary 2, 2022