Partner news & articles

The cybersecurity landscape continually evolves, and knowledge is key to staying ahead of the changing threat landscape. We're proud to be trusted advisors within our community, and we understand that knowledge is an asset not solely for our team but for our partners.

From industry-led articles and showcasing vendors to thought leadership and cybersecurity news, our experienced and knowledgeable team shares the latest and most valuable resources.

Looking for more? Check out our industry-focused webinars and events.

Partner News & Articles

About five years ago, Orbital Technology became aware that its existing Anti-Virus solution was not effectively protecting customers’ systems, and was allowing threats that were causing significant,...
If we strip back the complexities of the implied question in the title, we are left with one obvious statement: You want your business to be secure from pretty much everything that the world has got...
In March 2018 Travelex managed to leak around 17,000 people’s data. These unfortunate data subjects were all Tesco Bank customers; the data leaked included full names, dates of birth, addresses,...
Securing your client’s network against their staff OK, let’s be honest about this, this article is all about how Heimdal Security has the power to not just help your clients secure their networks but...
Back when people did not really understand much of the world around them, a lot believed that carrying a rabbit’s foot would bring them good luck.
No doubt you’ve read the recent news that NHS services across England have been hit by a large-scale cyberattack and they have elected to protect their IT systems by shutting them down as a...
It is not news to anyone who reads my posts that cybersecurity is one of the most important elements of any business strategy in this day and age. Although I usually write about the technicalities...
The Daily Telegraph reports today that a town council in Devon is being held to ransom after hackers demanded £3,000 for the safe return of documents including its allotments waiting list. Triggered...
So, in article 1, we have already discovered how 91.3% of second generation malware dials back for its encryption key via DNS. It is important now to look at the first layer of defence.