top of page


Keeping Your Children Safe Online in 2025: What Every Parent Needs to Know
In a world where toddlers can swipe before they can talk and teens live half their lives online; digital safety is no longer optional,...
shaun9968
Jun 116 min read
Â
Â


Ransomware: Should Your Business Pay?
The screen goes black. Then a message appears… “All your files have been encrypted. Pay £500,000 in cryptocurrency within 72 hours or...
shaun9968
Jun 35 min read
Â
Â


The Human Cost of a Cyber Attack: More Than Just Data Loss
When we hear about cyber-attacks, the headlines often focus on financial loss, stolen data, or operational downtime. How does this affect...
shaun9968
May 275 min read
Â
Â


Oversharing on LinkedIn: How It Can Hurt Your Business
Don’t hand cybercriminals the keys to your kingdom In today’s hyper connected world, platforms like LinkedIn have become essential tools...
shaun9968
May 194 min read
Â
Â


Path Traversal Vulnerability: How a Few Dots Can Open the Door to Your Business Data
Introduction Perhaps your business has a locked cabinet for your sensitive files. You keep it locked as you only want certain, authorised...
shaun9968
May 124 min read
Â
Â


Guide to Password Policies for Businesses (updated for 2025)
Why Strong Password Policies Matter Passwords remain a critical security barrier between your business and unauthorized access to your...
shaun9968
May 14 min read
Â
Â
Can the opposing camps regarding Shadow IT be reconciled through changes in organisational culture?
This paper by Richard Henson takes a historical view of the development of Shadow IT in organisations, and looks at the roots of the...
shaun9968
Apr 2513 min read
Â
Â


Why are Small Businesses Prime Targets for Cybercriminals?
Imagine locking up your store at night, only to realize the next morning that thieves have broken in—not through the front door, but...
shaun9968
Apr 164 min read
Â
Â


Cybercrime-as-a-Service: The Rising Threat to Businesses
In the past, cybercrime required technical expertise, sophisticated tools, and extensive knowledge to execute. I always pictured someone...
shaun9968
Apr 114 min read
Â
Â


The Growing Threat of SIM Swapping: Why Businesses Need to Be Vigilant
What is SIM Swapping? Cybercriminals attack systems either directly or via people. They are successful with people because they are good...
shaun9968
Mar 285 min read
Â
Â
Cyber Security Blogs
bottom of page
