Services

image

Website development

Is your website working for you?

Find out how>>
image

Penetration testing

Who's hacking your website? Protect it!

Find out how>>
image

Secure cloud backup

Can you recover your important files immediately?

Find out how>>
image

Seminars and Workshops

Protect yourself and your data from cyber attacks

Find out how>>

Recent blog posts

Recent blog posts

Facebook: how you really get hacked

Facebook: how you really get hacked I’ve written a lot over the past months about cybersecurity and social engineering and as October is cybersecurity awareness month, I thought I’d share some resources that might help. But first… How people think they get hacked How they really get hacked I’ve seen loads of these types of […]

How to prevent social engineering attacks

How to prevent social engineering attacks I’ve written a lot about different types of social engineering attacks and why we fall for them. But it’s not all bad news. We can do something to prevent them or protect ourselves from them. Prevention and protection can be implemented by using layers of defence. Each layer helps […]

Why do we fall for social engineering attacks?

Why do we fall for social engineering attacks? Over recent months, I’ve posted several articles on different types of social engineering attacks, including phishing (including how you can report phishing emails), vishing, baiting, water-holing, pretexting, diversion theft, honey traps, quid pro quo and tailgating. Now that we know what these are, I’m going to look […]

Image by Achin Verma from Pixabay

Tips for keeping your password safe and secure

Tips for keeping your password safe and secure We have loads of website we log in to these days – I have somewhere around a thousand. That’s a thousand possible places that hackers could get my password from and try to use elsewhere. So I have to keep my passwords safe and secure. Why password […]

Contact Us

To discuss your needs further call us on 07941 208957, email us or fill in the form

    name:
    email:
    telephone number:
    company name:
    Why are you contacting us: Website design/developmentBespoke web hosted softwareCybersecurityPenetration testingBackupCustomer relationship management (CRM) systemsOffice 365Data securitySecure data destructionData recoveryBusiness continuity planning