The Importance of Data Backup and Recovery

Data breaches and ransomware attacks can have catastrophic effects on business operations. They can lead [...]

Unknown or Unmanaged Devices Used by Administrators

The Cyber Security Operations Centre (CSOC) frequently deals with alerts triggered by routine administrative changes, [...]

The latest cyber-attack trend: Malicious PDF Link Obfuscation

Cyber attackers constantly seek new ways to trick users into granting access to their accounts. [...]

QR Codes in Spreadsheets and Office Documents

While this method isn’t new, it remains a prevalent phishing tactic. It works by diverting [...]

Enhancing digital defences with Multi-Factor Authentication

Multi-Factor Authentication (MFA) is a crucial layer of cyber security, yet many organisations find the [...]

Conducting a Comprehensive Security Audit

Protecting your IT infrastructure from cyber threats is crucial. For medium-sized enterprises, a security breach [...]

Enhancing Cybersecurity Through External Partnerships

In today's digital landscape, the sophistication of cyber threats is constantly evolving. Organisations face the [...]

Microsoft Introduces Mandatory MFA to Strengthen Azure Security

As cyberattacks become more frequent, sophisticated, and damaging, protecting your digital assets has never been [...]

Monitoring evolving DDoS trends is crucial for anticipating threats and updating defensive strategies

The Gcore Radar Report for the first half of 2024 offers a detailed analysis of [...]

Case Study: Upgrading Compute Infrastructure for Leading Insurer

A highly recognised insurer and reinsurer based in London, renowned for their expertise in Casualty, [...]