web counter
Business Email Compromise: The Ins and Outs

Business Email Compromise: The Ins and Outs

According to AIG  – one of the world’s leading global insurance organisations – ‘business email compromise’ (BEC) has overtaken data breaches and ransomware as the main trigger of AIG cyber claims in Europe, the Middle East and Africa. In 2018, BEC...
The History of Digital Authentication

The History of Digital Authentication

What is Digital Authentication? Digital authentication refers to the process by which a user’s identity is established and presented electronically. This is usually in order to gain access to an information system. Digital authentication is ingrained in our everyday...
Is My Phone Listening to Me?

Is My Phone Listening to Me?

Recently, mobile security company Wandera announced it had carried out research to address the conspiracy theory that tech giants are listening to our conversations.  This involved putting two phones – a Samsung Android and an Apple iPhone – into an “audio...
How to Delete Old Online Accounts

How to Delete Old Online Accounts

Old accounts that you’ve forgotten about and don’t use anymore could be putting your personal information at risk. We’re going to look at how this could happen, and show you how you can delete these so-called ‘zombie’ accounts. The Risks Think about all of those free...
How to Keep Your Data Safe Online

How to Keep Your Data Safe Online

Keeping passwords, financial information and other personal data safe is an increasingly difficult task for both individuals and businesses. With sophisticated cyber attacks on the rise, it is very important that users follow sound practices to stop their own data...
Cybersecurity and the 5G Network

Cybersecurity and the 5G Network

5G has been a hot topic in the news for the last few months. The fifth generation of mobile internet connectivity has promised us faster data download and upload speeds and wider coverage. Each year, we use more and more data, and we are using our mobile network for...