top of page


shaun9968
7 days ago4 min read
The Hidden Threat: Fake CAPTCHA Pages and Their Danger to Businesses
Some may know the term CAPTCHA ( Completely Automated Public Turing tests to tell Computers and Humans Apart ). Most won’t recognise the...
8 views
0 comments

shaun9968
Feb 275 min read
Understanding API Security: Protecting Your Business from Digital Threats
The way that digital technologies, and therefore businesses have been evolving, it has come to pass that businesses rely on APIs (...
26 views
0 comments

shaun9968
Feb 213 min read
MFA Fatigue: A Growing Security Risk for Businesses and How to Prevent it
Multi-Factor Authentication (MFA) is widely recognized as a crucial security measure for businesses. By requiring additional...
7 views
0 comments

shaun9968
Feb 174 min read
Log Monitoring: The Silent Guardian of Your Business Security
Running a business without log monitoring is like driving without a dashboard. You might be moving forward, but without fuel gauges,...
8 views
0 comments

shaun9968
Feb 114 min read
Credential Stuffing Attacks: The Silent Intruders Exploiting Weak Security
Introduction: The “Master Key” Problem Imagine you have a single key that unlocks your house, your office, and even your car. It’s...
4 views
0 comments

shaun9968
Feb 44 min read
Dark Web Monitoring: What Every Business Should Know
Introduction To most people, the dark web may feel like a shadowy underworld that exists beyond the reach of the typical internet user....
6 views
0 comments


shaun9968
Jan 314 min read
Understanding the Dark Web: A Hotbed for Cybercrime; its Impact on Businesses
Introduction This article delves into the nature of the dark web, explores its involvement in various cybercrimes, and examines the...
12 views
0 comments


shaun9968
Jan 285 min read
The Dangers of Shadow IT; How to Manage “short-cut” employees
Introduction In today’s rapidly evolving digital landscape, employees are becoming increasingly tech-savvy (or at least they think that...
10 views
0 comments

shaun9968
Jan 135 min read
Why Firewalls Matter and why they must be properly configured
Imagine your business as a bustling castle filled with treasures: customer data, intellectual property, critical operations, and business...
2 views
0 comments


shaun9968
Dec 24, 20243 min read
Active Reconnaissance: The Thief's Blueprint for Burglary
In a previous blog post we covered passive reconnaissance. The next step for the cybercriminal is active reconnaissance, a further...
4 views
0 comments

shaun9968
Dec 19, 20245 min read
Passive Reconnaissance: What Hackers Learn About your Business and How to Minimize your Exposure
Introduction You have probably heard of the term “reconnaissance”, and most likely that will conjure up different images for different...
4 views
0 comments


shaun9968
Nov 8, 20245 min read
Beware the Trojan Horse: Unmasking Upload Vulnerabilities in Your Business
Introduction Imagine a bustling marketplace, where merchants display their goods, and guards stand at the gate, screening each visitor....
8 views
0 comments

shaun9968
Oct 29, 20248 min read
An Introduction to Man-in-the-Middle Attacks
“The Eavesdropper in the Digital Alley” In the world of cybersecurity, there are few attacks as cunning and deceptive as the...
4 views
0 comments

shaun9968
Oct 25, 20245 min read
Title: Understanding IDOR Vulnerabilities and Their Impact on Business Security.
Introduction You may be forgiven for not being familiar with the acronym IDOR. The term behind the acronym, Insecure Direct Object...
14 views
0 comments

shaun9968
Oct 8, 20244 min read
Title: Session Hijacking: A Hidden Threat to Your Business’s Security
In this blog, we’ll discuss what session hijacking is, explore how it happens, and reveal the potential dangers it poses to businesses in...
6 views
0 comments


shaun9968
Sep 24, 20245 min read
Command Injection: A Critical Security Threat for Businesses
In today’s increasingly connected world, web applications are like the doors and windows of your business. They allow data to flow in and...
10 views
0 comments


shaun9968
Sep 20, 20244 min read
An introduction to Zero Trust Architectures:
Zero trust, a term which gives a fair amount away about what it means in those two words alone. Zero (No) Trust. So how does this fit in...
14 views
0 comments


shaun9968
Aug 21, 20246 min read
A Comprehensive Guide to IT Usage Policies and New Starter IT Training from a Security Perspective
In today’s digital landscape, where cyber threats are increasingly sophisticated, it’s more crucial than ever for organizations to have...
18 views
0 comments


shaun9968
Aug 12, 20249 min read
Staying Safe Online: A Guide for Parents to Protect Their Children
In today’s digital world, the internet is woven into every aspect of our lives. For children, it has become a vast digital playground of...
24 views
0 comments


shaun9968
Jul 31, 20247 min read
The Dark Side of Social Media: Misinformation, Deepfakes and the Importance of Verification for Businesses
In the digital age, social media has revolutionized the way businesses connect with their audience, transforming marketing, customer...
20 views
0 comments
Cyber Security Blogs
bottom of page