Protecting your Emails with DKIM/DMARC
Reading Time: 3 minutesSending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.
CNC House
Lady Bee Enterprise Centre
Albion Street
Southwick
BRIGHTON
BN42 4BW
Reading Time: 3 minutesSending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.
Reading Time: 5 minutesThe financial sector is uniquely exposed to cyber risk because of the large amounts of data and high-risk transactions that are handled.
Reading Time: 2 minutesIn the 200 mph world of Formula 1, speed and precision are paramount. But, it wasn’t a race car that brought the Fédération Internationale de l’Automobile (FIA) to its knees—it was a cleverly crafted email
Reading Time: 3 minutesWhat is your earliest recollection of IT in your life? I was about 13 years old, and I remember arguing with my dad about whether I could stay up all night to play computer games on a PC that he had brought home.
Reading Time: 2 minutesThere’s a common myth going around that Microsoft 365 automatically protects and backs up your data. Sadly, it’s a popular misconception that many businesses put themselves at risk with
Reading Time: 7 minutesJune was a black month with some of the worst cyber hacks perpetrated in 2024 so far. Ticketmaster, the NHS and Santander were all in the national press, with news of them being hacked by cyber terrorists.
Reading Time: 3 minutesThis time 40 years ago in June 1984, Ghostbusters was the number one film.
Reading Time: 5 minutesSo, you’ve been going through your checklist before you fly off on your business trip: encrypt or delete sensitive files? CHECK. Tamper seals over the hard drive access points? CHECK. Spare USB port locks? CHECK, privacy screen? CHECK. Was it always like this?
Reading Time: 3 minutesI can remember how much it cost to see Star Wars, my first car’s registration plate or who was number 1 in the charts, 30 years ago, but a password from yesterday?
Reading Time: 3 minutesThere are many sides to cyber crime. However, there is another aspect of the horror of cyber crime that is the cyber scam factory.
Reading Time: 5 minutesIn the IT industry, we have a penchant for acronyms. If we can condense the name of a service, product, or piece of equipment into just three letters, we’re as happy as a lark.
Reading Time: 3 minutesThe world’s largest criminal ransomware gang (Lockbit) have not only been infiltrated by the UK’s National Crime Agency (NCA) but they have had their data stolen.
Reading Time: 3 minutesSouthern Water now admits that as many as half a million customers’ personal information may have been stolen in the recent cyber attack.
Reading Time: 4 minutesPhishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.
Reading Time: 3 minutesSouthern Water confirms network breach, as cybercriminals Black Basta attempt to hold the UK utility to ransom as they threaten to release data.
Reading Time: 3 minutesYou go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.
Reading Time: 2 minutesLush the cosmetics store, home to some of the most beautiful fragrances in the high street, has announced on its website, that it had been the victim of a cyber security incident.
Reading Time: 4 minutesRansomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society.
Reading Time: 5 minutesIn today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.
Reading Time: 4 minutesCybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape
Reading Time: 5 minutesWhen the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
Reading Time: 5 minutesToday in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.
Reading Time: 4 minutesWhatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.
Reading Time: 4 minutesMichael Caine, Cameron Diaz, Will Smith, Barbara Streisand, Patrick Swayze, (that’s not fair), Halle Berry and even Robert de Niro have won one. ‘The Golden
Reading Time: 4 minutesMobile Device Management (MDM) is a system that allows businesses to securely manage the devices that their employees use to access company data and resources
Reading Time: 4 minutesNot quite the opening line of Hamlet, Act 1 Scene 1. However, in Shakespeare’s version as Bernardo looks out from the misty battlements, high up
Reading Time: 4 minutesWi-Fi is everywhere. Buses, trains, cafes and pubs of course. It’s at the gym, taxis, shopping centres, the list goes on. Hold on a minute,
Reading Time: 4 minutesThe news is full of it at the moment; a recession is just around the corner. ‘The recession we have been dreading is about to
Reading Time: 5 minutesIn its purest form, DDoS stands for Distributed Denial of Service. A DDoS attack is a combined cyber attack on a specific server or network,
Reading Time: 2 minutesBeware of people posing as someone else online – it’s a growing threat to individuals and businesses. The phenomenon has been known as ‘catfishing’ for
Reading Time: 2 minutesThere’s a lack of cyber security expertise and insufficient expenditure in many organisations which makes them more vulnerable to cyber-attacks. One of the most vulnerable
Reading Time: 2 minutesThe theft of up to 500 million customer records from the Marriott hotel group is a shocking reminder to everyone how vulnerable personal information is
Reading Time: 2 minutesBe warned against buying hardware from China, it could be fitted with extra micro-chips designed to break into your organisation. The threat from technology built
Reading Time: 2 minutesA massive breach of security at British Airways, which compromised 380,000 card payments, shows that organisations of all sizes are vulnerable to cyberattacks if their
Reading Time: 2 minutesChilling new research reveals cyber criminals are outspending big businesses and posing an ever-increasing threat to UK companies. The survey commissioned by software company Carbon
Reading Time: 2 minutesCompanies should be aware of the hidden security threat from fax machines which are an unlocked backdoor for criminals. New research from Check Point Security
Reading Time: 2 minutesCompanies need to protect their people and systems against hacktivism because it can compromise their networks. Worse still, it can be a cover for cyber
Reading Time: 2 minutesA data breach that occurred two years ago has now cost Uber its licence to operate a taxi-hailing service in Brighton. It’s a perfect example
Reading Time: 2 minutesThe launch of a new security standard for wi-fi connectivity will make remote access much safer. Version three of Wi-Fi Protected Access (WPA3) follows research
Reading Time: 2 minutesTwo-factor authentication is now essential to beat cyber criminals.
Reading Time: 2 minutesBeware of social engineering by cyber criminals. It’s an ever-growing threat to businesses worldwide.
Reading Time: 2 minutesLoss of emails can badly affect operational effectiveness and could breach data protection law if the lost correspondence contains customer records.
Reading Time: 2 minutesPhishing attacks by cyber criminals are becoming much more difficult to spot and many people are still being duped into taking the bait.
Reading Time: 2 minutesMany victims of ransomware attacks are turning to No More Ransom to have their data unlocked for free but the best way to beat cyber crime is by improving IT security.
Reading Time: 2 minutesCyber-crime is now such a major threat to UK businesses that many companies will soon have to prove they are properly protected to avoid losing key contracts.
Reading Time: 2 minutesMany growing companies are choosing Microsoft 10 Enterprise because of the enhanced security it offers.
Reading Time: 2 minutesMany companies think they have good IT security to protect them from external attacks but are still vulnerable to insider threats.
Reading Time: 2 minutesToo many businesses are lazy about passwords and risk being hacked. They are in danger of losing vital data and badly damaging their reputation.
Reading Time: 2 minutesWhaling on the oceans may be a thing of the past in most countries but it’s now a major threat in the cyber world.
Reading Time: 2 minutesIf you’re serious about selling services to major organisations then you need to have ISO27001.
Reading Time: 2 minutesBusinesses across Sussex are being warned about ransomware which invades IT systems often via infected email attachments.
Reading Time: 2 minutesCompanies that are still using older versions of Microsoft’s Internet Explorer must upgrade as soon as possible.
If they don’t, their systems will be vulnerable to attack.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category . |
cookielawinfo-checkbox-functional | 1 year | The cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Necessary" category . |
cookielawinfo-checkbox-others | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Others". |
cookielawinfo-checkbox-performance | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Performance". |
CookieLawInfoConsent | 1 year | Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie. |
elementor | never | This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_gat_gtag_UA_20840989_1 | 1 minute | Set by Google to distinguish users. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |