020 7193 4905

Blog

Phishing Spotlight Research Report

Phishing Spotlight Research Report

With the continued use of mobile devices for both personal and business use, the entire world is looking at mobile accessibility as the vehicle to...

Mission Impossible

Mission Impossible

"Your mission, Jim, should you decide to accept it, is to come up with a response to these demands within twelve hours." What would you do if all...

Incident Response 101

Incident Response 101

It'll be all right on the night – NOT When a disaster such as a ransomware attack strikes your organisation, how well are you prepared? A cyber...

Remote working has brought problems

Remote working has brought problems

These are not theoretical possibilities, but real-life attacks which can cost an enterprise tens of thousands of pounds – or more   [Cue Mission...

Secure DNS Lookup

Secure DNS Lookup

Even asking for directions can lead to trouble... How do you find your way on the Internet? Or rather, how does your computer find its way? When you...

The evidence shows that…

The evidence shows that…

How digital forensic science can be used to make a watertight legal case At a time when a laptop has been supposedly been left behind at a repair...

It can’t happen to us

It can’t happen to us

Unfortunately, it can happen, even to the most secure of us. The recent breach at FireEye, one of the world’s largest and most sophisticated...

Cyberwarfare as an Olympic event

Cyberwarfare as an Olympic event

Russia is revealed as the prime actor in attacks on the 2018 Winter Games It has recently been revealed that Russian cyberwarriors targeted the 2018...