top of page


A Veiled Threat? The Dangers of B2B Digital Supply Chain Attacks…(and defence measures for all supply chain partners)
Businesses have always relied on suppliers, vendors, and service providers to keep operations running. These organisations looked after...
shaun9968
Mar 203 min read


The Hidden Threat: Fake CAPTCHA Pages and Their Danger to Businesses
Some may know the term CAPTCHA ( Completely Automated Public Turing tests to tell Computers and Humans Apart ). Most won’t recognise the...
shaun9968
Mar 114 min read


Understanding API Security: Protecting Your Business from Digital Threats
The way that digital technologies, and therefore businesses have been evolving, it has come to pass that businesses rely on APIs (...
shaun9968
Feb 275 min read


MFA Fatigue: A Growing Security Risk for Businesses and How to Prevent it
Multi-Factor Authentication (MFA) is widely recognized as a crucial security measure for businesses. By requiring additional...
shaun9968
Feb 213 min read


Log Monitoring: The Silent Guardian of Your Business Security
Running a business without log monitoring is like driving without a dashboard. You might be moving forward, but without fuel gauges,...
shaun9968
Feb 174 min read


Credential Stuffing Attacks: The Silent Intruders Exploiting Weak Security
Introduction: The “Master Key” Problem Imagine you have a single key that unlocks your house, your office, and even your car. It’s...
shaun9968
Feb 114 min read


Dark Web Monitoring: What Every Business Should Know
Introduction To most people, the dark web may feel like a shadowy underworld that exists beyond the reach of the typical internet user....
shaun9968
Feb 44 min read


Understanding the Dark Web: A Hotbed for Cybercrime; its Impact on Businesses
Introduction This article delves into the nature of the dark web, explores its involvement in various cybercrimes, and examines the...
shaun9968
Jan 314 min read


The Dangers of Shadow IT; How to Manage “short-cut” employees
Introduction In today’s rapidly evolving digital landscape, employees are becoming increasingly tech-savvy (or at least they think that...
shaun9968
Jan 285 min read


Why Firewalls Matter and why they must be properly configured
Imagine your business as a bustling castle filled with treasures: customer data, intellectual property, critical operations, and business...
shaun9968
Jan 135 min read
Cyber Security Blogs
bottom of page
