Services

image

Website development

Is your website working for you?

Find out how>>
image

Penetration testing

Who's hacking your website? Protect it!

Find out how>>
image

Secure cloud backup

Can you recover your important files immediately?

Find out how>>
image

Seminars and Workshops

Protect yourself and your data from cyber attacks

Find out how>>

Recent blog posts

Recent blog posts

Why do we fall for social engineering attacks?

Why do we fall for social engineering attacks? Over recent months, I’ve posted several articles on different types of social engineering attacks, including phishing (including how you can report phishing emails), vishing, baiting, water-holing, pretexting, diversion theft, honey traps, quid pro quo and tailgating. Now that we know what these are, I’m going to look […]

Image by Achin Verma from Pixabay

Tips for keeping your password safe and secure

Tips for keeping your password safe and secure We have loads of website we log in to these days – I have somewhere around a thousand. That’s a thousand possible places that hackers could get my password from and try to use elsewhere. So I have to keep my passwords safe and secure. Why password […]

Photo by Liza Summer from Pexels

What is tailgating?

What is tailgating? Tailgating (also known as piggybacking) is one of the commonest ways hackers and other mal-actors gain access to restricted areas. This could be into a building or an area in the building like the computer room. The mal-actor follows a person through a secure access point, relying on the person to hold […]

10 keys to improve your cyber resilience

10 keys to improve your cyber resilience Over the last year, more and more of us have been working from home due to the Covid-19 pandemic. With working from home set to continue even after we get through the pandemic, here are 10 simple things you can do to improve your cyber resilience. These keys […]

Contact Us

To discuss your needs further call us on 07941 208957, email us or fill in the form

    name:
    email:
    telephone number:
    company name:
    Why are you contacting us: Website design/developmentBespoke web hosted softwareCybersecurityPenetration testingBackupCustomer relationship management (CRM) systemsOffice 365Data securitySecure data destructionData recoveryBusiness continuity planning