top of page


The Hidden Trap of Fake Browser Updates: A Growing Business Threat
You’re browsing the web then suddenly you get “Your browser is out of date. Click here to update now.” It looks harmless even helpful....
shaun9968
Sep 305 min read


When an “a” Isn’t Really an “a”: The Hidden Danger of Sophisticated (Homographic) Phishing Attacks
Introduction Imagine this, you glance at an email from your bank. The logo looks right, the message feels urgent, there are none of the...
shaun9968
Sep 194 min read


Remote Desktop Protocol (RDP) Attacks: A Hidden Doorway into Your Business
Introduction Imagine locking up your office for the night, setting the alarms, and walking away confident everything is secure, not...
shaun9968
Sep 94 min read


Zero-Day Attacks: The Hidden Threat Businesses Can’t See Coming. The Secret Door Your Business Didn’t Know Existed…
Imagine locking your office every night, installing cameras, and even hiring security guards, state of the art monitoring system, only to...
shaun9968
Sep 24 min read


When Trust is the Weakest Link: The Hidden Danger Behind MFA
In the ever-evolving world of cyber security, it has become the convention that users trust systems that double-check our identity e.g....
shaun9968
Aug 194 min read


AI in Phishing: How Chatbots Are Outsmarting Staff and What Businesses Can Do About It
Imagine this: a polite, articulate “customer” reaches out to your support team asking for a refund. They provide convincing order...
shaun9968
Aug 74 min read


Hacked While Travelling? Cyber Security Tips & The Hidden Risks of Business Trips
Business travel is back in full swing. Conferences, client meetings, and global partnerships have professionals hopping on planes and...
shaun9968
Aug 35 min read


Cybersecurity Awareness Training in 2025: Time to Ditch the Boring Slides
Introduction Cybersecurity awareness training has long been treated like a checkbox exercise: watch a video, click through a few slides,...
shaun9968
Jul 166 min read


From Welcome to Farewell: The Cybersecurity Risks involved in Employee Onboarding and Offboarding
Introduction Imagine handing a stranger the keys to your office, granting them access to filing cabinets, safes, and confidential client...
shaun9968
Jul 114 min read


The Silent Threat in the Office: How Attack Hardware Puts Your Business at Risk
Introduction When we think of cyber-attacks, we often picture faceless hackers exploiting software vulnerabilities or launching phishing...
shaun9968
Jun 304 min read
Cyber Security Blogs
bottom of page