top of page


Path Traversal Vulnerability: How a Few Dots Can Open the Door to Your Business Data
Introduction Perhaps your business has a locked cabinet for your sensitive files. You keep it locked as you only want certain, authorised...
shaun9968
May 124 min read
Â
Â


Guide to Password Policies for Businesses (updated for 2025)
Why Strong Password Policies Matter Passwords remain a critical security barrier between your business and unauthorized access to your...
shaun9968
May 14 min read
Â
Â
Can the opposing camps regarding Shadow IT be reconciled through changes in organisational culture?
This paper by Richard Henson takes a historical view of the development of Shadow IT in organisations, and looks at the roots of the...
shaun9968
Apr 2513 min read
Â
Â


Why are Small Businesses Prime Targets for Cybercriminals?
Imagine locking up your store at night, only to realize the next morning that thieves have broken in—not through the front door, but...
shaun9968
Apr 164 min read
Â
Â


Cybercrime-as-a-Service: The Rising Threat to Businesses
In the past, cybercrime required technical expertise, sophisticated tools, and extensive knowledge to execute. I always pictured someone...
shaun9968
Apr 114 min read
Â
Â


The Growing Threat of SIM Swapping: Why Businesses Need to Be Vigilant
What is SIM Swapping? Cybercriminals attack systems either directly or via people. They are successful with people because they are good...
shaun9968
Mar 285 min read
Â
Â


A Veiled Threat? The Dangers of B2B Digital Supply Chain Attacks…(and defence measures for all supply chain partners)
Businesses have always  relied on suppliers, vendors, and service providers to keep operations running. These organisations looked after...
shaun9968
Mar 203 min read
Â
Â


The Hidden Threat: Fake CAPTCHA Pages and Their Danger to Businesses
Some may know the term CAPTCHA  ( Completely Automated Public Turing tests to tell Computers and Humans Apart ). Most won’t recognise the...
shaun9968
Mar 114 min read
Â
Â


Understanding API Security: Protecting Your Business from Digital Threats
The way that digital technologies, and therefore businesses have been evolving, it has come to pass that businesses rely on APIs (...
shaun9968
Feb 275 min read
Â
Â


MFA Fatigue: A Growing Security Risk for Businesses and How to Prevent it
Multi-Factor Authentication (MFA) is widely recognized as a crucial security measure for businesses. By requiring additional...
shaun9968
Feb 213 min read
Â
Â
Cyber Security Blogs
bottom of page