Tel: +44 (0)3333 200 222
Email: [email protected]


Browse the latest news and opinions from the business communications world.
Filter by:

Blog Categories

Blog Categories
  • Security Network
  • Microsoft Cloud

How To Perform a Cyber Security Audit 

Cybersecurity audits form a very crucial component of any organisation's defence against privacy violations and data breaches. By regularly performing cybersecurity audits, you can identify security weaknesses in your system and determine whether your organisation complies with the relevant data laws, like the GDPR (General Data Protection Regulation)
Full article

How Much Compensation for a Data Breach?

Seeking qualified, independent legal counsel from reputable, authorised data breach experts is the first step in making a claim for compensation if you believe your data protection rights have been violated.
Full article
Tailgating in cyber security

What is Tailgating in cyber security?

Tailgating also known as piggybacking, is one of the most widespread security breaches affecting businesses and where cyber criminals try to sneak into a restricted area where they are not allowed to be and often go undetected.
Full article
Whaling in cyber security

What is Whaling in cyber security?

A whaling attack is one of the types of phishing attacks directed at high-level executives where attackers act as legitimate, trustworthy, reputable and persuade a victim to share highly sensitive information with a fraudulent account.
Full article
Spooling in cyber security

What Is Spooling in cyber security?

When talking about cyber security, computer viruses, malware or different kinds of social engineering attacks are all in our minds. However, have you heard about spooling? What is spooling in cybersecurity? In the following blog, we will identify what spooling is and how to prevent spooling in cyber security.
Full article
Social Engineering in Cyber Security

What is Social Engineering in Cyber Security

Social engineering takes advantage of human behaviours and natural tendencies. Social engineering attacks are conducted by analysing how users will react if a fake offer or scenario is presented to them. It exploits human psychology to manipulate people into making security mistakes and giving away confidential information.
Full article
Smishing in cyber security

What is Smishing in cyber security?

Smishing is a form of phishing that uses a mobile phone as the attack platform. Cyberattacks are carried out by criminals with the goal of obtaining personal data such as payment card numbers. Smishing is a type of illegal assault that is carried out using SMS or text messages.
Full article
Skimming in cyber security

What is Skimming in Cyber Security?

Skimming is a tactic used by criminals to steal payment details and personal information from a payment card holder. Many ways can be used by fraudsters to illegally obtain card information. Recently, with the most advanced approaches, e-skimming is another way to collect card information in real-time remotely.
Full article
Shoulder surfing in cyber security

What is Shoulder Surfing in cyber security?

Have you ever heard of Shoulder Surfing? Yes, it is another type of social engineering attack where scammers get your personal information and it is the simplest form of fraud. Literally, everyone can be easy to learn how to do and it can happen in most public places.
Full article
SIEM in cyber security

What is SIEM in cyber security?

Security information and event management (SIEM) technology supports threat detection compliance and security incident management through the collection and analysis of both real-time and historical of security events, as well as a wide variety of other event and contextual data sources.
Full article
1 2 3

Related Resources

Trusted by 100s of businesses already
Uniquely tailored approach
Outstanding customer service
Talk with us
We pride ourselves on being an honest trustworthy business communications provider
Call 03333 200 222 or if you would prefer us to call you.
Schedule a call
We love emails, to send us one use [email protected] or fill in our
Contact Form
Live Chat
Got a question? Our live chat is open and ready to assist
Chat Now