top of page


Keeping Your Children Safe Online in 2025: What Every Parent Needs to Know
In a world where toddlers can swipe before they can talk and teens live half their lives online; digital safety is no longer optional,...
shaun9968
3 days ago6 min read
0 views
0 comments


Ransomware: Should Your Business Pay?
The screen goes black. Then a message appears… “All your files have been encrypted. Pay £500,000 in cryptocurrency within 72 hours or...
shaun9968
Jun 35 min read
7 views
0 comments


The Human Cost of a Cyber Attack: More Than Just Data Loss
When we hear about cyber-attacks, the headlines often focus on financial loss, stolen data, or operational downtime. How does this affect...
shaun9968
May 275 min read
12 views
0 comments


Oversharing on LinkedIn: How It Can Hurt Your Business
Don’t hand cybercriminals the keys to your kingdom In today’s hyper connected world, platforms like LinkedIn have become essential tools...
shaun9968
May 194 min read
9 views
1 comment


Path Traversal Vulnerability: How a Few Dots Can Open the Door to Your Business Data
Introduction Perhaps your business has a locked cabinet for your sensitive files. You keep it locked as you only want certain, authorised...
shaun9968
May 124 min read
7 views
0 comments


Guide to Password Policies for Businesses (updated for 2025)
Why Strong Password Policies Matter Passwords remain a critical security barrier between your business and unauthorized access to your...
shaun9968
May 14 min read
12 views
0 comments
Can the opposing camps regarding Shadow IT be reconciled through changes in organisational culture?
This paper by Richard Henson takes a historical view of the development of Shadow IT in organisations, and looks at the roots of the...
shaun9968
Apr 2513 min read
11 views
0 comments


Why are Small Businesses Prime Targets for Cybercriminals?
Imagine locking up your store at night, only to realize the next morning that thieves have broken in—not through the front door, but...
shaun9968
Apr 164 min read
8 views
0 comments


Cybercrime-as-a-Service: The Rising Threat to Businesses
In the past, cybercrime required technical expertise, sophisticated tools, and extensive knowledge to execute. I always pictured someone...
shaun9968
Apr 114 min read
6 views
0 comments


The Growing Threat of SIM Swapping: Why Businesses Need to Be Vigilant
What is SIM Swapping? Cybercriminals attack systems either directly or via people. They are successful with people because they are good...
shaun9968
Mar 285 min read
5 views
0 comments


A Veiled Threat? The Dangers of B2B Digital Supply Chain Attacks…(and defence measures for all supply chain partners)
Businesses have always relied on suppliers, vendors, and service providers to keep operations running. These organisations looked after...
shaun9968
Mar 203 min read
15 views
0 comments


The Hidden Threat: Fake CAPTCHA Pages and Their Danger to Businesses
Some may know the term CAPTCHA ( Completely Automated Public Turing tests to tell Computers and Humans Apart ). Most won’t recognise the...
shaun9968
Mar 114 min read
13 views
0 comments


Understanding API Security: Protecting Your Business from Digital Threats
The way that digital technologies, and therefore businesses have been evolving, it has come to pass that businesses rely on APIs (...
shaun9968
Feb 275 min read
30 views
0 comments


MFA Fatigue: A Growing Security Risk for Businesses and How to Prevent it
Multi-Factor Authentication (MFA) is widely recognized as a crucial security measure for businesses. By requiring additional...
shaun9968
Feb 213 min read
8 views
0 comments


Log Monitoring: The Silent Guardian of Your Business Security
Running a business without log monitoring is like driving without a dashboard. You might be moving forward, but without fuel gauges,...
shaun9968
Feb 174 min read
9 views
0 comments


Credential Stuffing Attacks: The Silent Intruders Exploiting Weak Security
Introduction: The “Master Key” Problem Imagine you have a single key that unlocks your house, your office, and even your car. It’s...
shaun9968
Feb 114 min read
4 views
0 comments


Dark Web Monitoring: What Every Business Should Know
Introduction To most people, the dark web may feel like a shadowy underworld that exists beyond the reach of the typical internet user....
shaun9968
Feb 44 min read
7 views
0 comments


Understanding the Dark Web: A Hotbed for Cybercrime; its Impact on Businesses
Introduction This article delves into the nature of the dark web, explores its involvement in various cybercrimes, and examines the...
shaun9968
Jan 314 min read
14 views
0 comments


The Dangers of Shadow IT; How to Manage “short-cut” employees
Introduction In today’s rapidly evolving digital landscape, employees are becoming increasingly tech-savvy (or at least they think that...
shaun9968
Jan 285 min read
16 views
0 comments


Why Firewalls Matter and why they must be properly configured
Imagine your business as a bustling castle filled with treasures: customer data, intellectual property, critical operations, and business...
shaun9968
Jan 135 min read
3 views
0 comments
Cyber Security Blogs
bottom of page