Cyber Security

Cyber Security Archives

privacy breaches, cyber incidents

The real cost of cyber breaches to SMEs

Many businesses were unaware of the threats they face, with SMEs who outsource their cybersecurity believing they are be...

Three ways SMEs can reduce their cyber exposure

Many SMEs are unaware that basic cyber hygiene practices can reduce cyber risk because a great majority of breaches stem...

Ransomware is the biggest cyber threat to small business – are you prepared?

Ransomware can bring a business to its knees, and without business continuity and data recovery plans, it will be harder...

Is a future without passwords a possibility?

Tech advances mean we’re close to solutions with the portability and backward compatibility that’s required to eliminate...

Five things you should do in 2021 to improve your small business

Online visibility isn’t just your website, it’s any space from socials to Google My Business to directories where a cust...
Beware scams at tax time

Struggling small businesses falling prey to loan scams

Struggling small businesses are urged to be wary of increasingly sophisticated loan scams targeting cash-poor owners as ...
data privacy, cyber threats, best practices

How employee awareness can combat SME security threats

Security awareness programs are a proven way to build resilience against attacks by changing employee behaviours that ca...
data privacy, cyber threats, best practices

Secure your business with a proactive approach to cybersecurity

A proactive approach to cybersecurity helps you close the security gap and protect your IT infrastructure against rapidl...
secure, cyber-safe

Keeping SMEs cyber-safe as they head back to work

In the midst of rising cybersecurity issues, SME leaders must make their systems cyber-safe, and that starts with their ...
email scams, email scam, invoice scam

How leaked company credentials are creating a phishing tsunami in 2021

Too few SMEs are taking appropriate measures to effectively prevent cybercriminals from accessing and exploiting stolen ...