Services

image

Website development

Is your website working for you?

Find out how>>
image

Penetration testing

Who's hacking your website? Protect it!

Find out how>>
image

Secure cloud backup

Can you recover your important files immediately?

Find out how>>
image

Seminars and Workshops

Protect yourself and your data from cyber attacks

Find out how>>

Recent blog posts

Recent blog posts

How to prevent social engineering attacks

How to prevent social engineering attacks I’ve written a lot about different types of social engineering attacks and why we fall for them. But it’s not all bad news. We can do something to prevent them or protect ourselves from them. Prevention and protection can be implemented by using layers of defence. Each layer helps […]

Why do we fall for social engineering attacks?

Why do we fall for social engineering attacks? Over recent months, I’ve posted several articles on different types of social engineering attacks, including phishing (including how you can report phishing emails), vishing, baiting, water-holing, pretexting, diversion theft, honey traps, quid pro quo and tailgating. Now that we know what these are, I’m going to look […]

Image by Achin Verma from Pixabay

Tips for keeping your password safe and secure

Tips for keeping your password safe and secure We have loads of website we log in to these days – I have somewhere around a thousand. That’s a thousand possible places that hackers could get my password from and try to use elsewhere. So I have to keep my passwords safe and secure. Why password […]

Photo by Liza Summer from Pexels

What is tailgating?

What is tailgating? Tailgating (also known as piggybacking) is one of the commonest ways hackers and other mal-actors gain access to restricted areas. This could be into a building or an area in the building like the computer room. The mal-actor follows a person through a secure access point, relying on the person to hold […]

Contact Us

To discuss your needs further call us on 07941 208957, email us or fill in the form

    name:
    email:
    telephone number:
    company name:
    Why are you contacting us: Website design/developmentBespoke web hosted softwareCybersecurityPenetration testingBackupCustomer relationship management (CRM) systemsOffice 365Data securitySecure data destructionData recoveryBusiness continuity planning