Blog

Work from Home – Hackers Dream!

WORK FROM HOME – HACKERS DREAM!   All across the world, people are being asked to work and study from home because of the coronavirus pandemic and they are bringing their laptops, sensitive company data and access to critical systems home. We need serious thought around the potential cybersecurity risks, as these systems are not […]

Read

Man in the middle attack

Man-in-The-Middle Attack A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website to capture credit card or other financial information. How to protect yourself Walk with your own portable Wi-Fi hotspot Verify the SSID with the hotel or airport authority before connecting Use a Virtual Private Network (VPN) to […]

Read

Are you a target for hackers?

Have You Made Yourself a Target? Have you heard the statement, “It won’t happen to me”, then it happened!  We are all at risk and the stakes are high – to your personal and financial well-being. Network security is everyone’s responsibility, not just the CIO. You must remain vigilant and aware of your virtual and […]

Read

6 Reasons Why an Antivirus is not Enough

Regular Antivirus software detects, stops, and treats viruses and worms, but antivirus alone is not enough for SMBs with business-critical data. Targeted cyberattacks are on the rise, and this means your approach to protecting your data should also evolve. Regular antivirus software may be sufficient for individual devices if they don’t store private data. SMBs […]

Read

Six Benefits of a Vulnerability Assessment for Small to Mid-Size Businesses

A Vulnerability Assessment is a critical first step that SMBs can take to protect their business from cyber threats before they occur. When you hear or see a pop up which says “Threat Detected”, automatically, you’re alerted to respond. If your computer warns you of a suspicious site or activity, most people will not proceed […]

Read

Six Benefits of Outsourcing your Security Operations Center by Rob Mayo-Smith

Read our new blog detailing the benefits of outsourcing your Security Operations Centre.

Read

Six Benefits to Outsourcing your Security Operations Center (SOC) by Rob Mayo-Smith

Security Operations Centers (SOC) are facilities that house cybersecurity teams who monitor, detect, and respond to threats providing a critical element of all good I.T. security programs. Here I make an argument why outsourcing to a managed 24/7 SOC can often be more effective than having an in-house team.  It enables immediate access to talented, […]

Read

Avoiding Ransomware Threats on Social Media

Ransomware is one of the biggest cyber threats right now, where hackers threaten the victims’ data unless a ransom is paid. With an estimated 2.77 billion people using social media in 2019, it’s no surprise cybercriminals use it for easy attacks. They have become one of the most significant gateways for malware, spread through shortened URLs […]

Read

Security Information and Event Management (SIEM)  by Simply Secures, Steven Gross.

Head of Technical at Simply Secure, Steven Gross, is a cybersecurity expert with over 20 years of experience. He’s skilled in delivering end-to-end solutions, so we sat down for a chat about (SIEM) and how it can help your business. What is SIEM? SIEM is essentially a software tool that combines the capabilities of two […]

Read

Top Tips on Preventing Cybercrime

The best way to combat cybercrime is by not becoming a victim in the first place. To that end, here are our top tips to simply secure your digital world. Secure Devices Don’t download anything to your computer, tablet, or smartphone that you were not expecting to do when you got online. Bookmark all of […]

Read