Cyber Christmas Day 3!πŸŽ„ – Northern Rights

1500 by 1000 pixels 2

Today, we’re spotlighting Graeme Stewart, IT Lead at Northern Rights Social Enterprise Ltd, and their chosen charity Emmaus UK. Northern Rights, based in the North-East, is a social enterprise dedicated to transforming lives by supporting disadvantaged individuals from diverse backgrounds in finding sustainable employment. Their passion and commitment to making a difference was obvious during […]

Cyber Christmas Day 2! πŸŽ„ – Advanced Manufacturing Forum

1500 by 1000 pixels 1

Today Arthur Hodgson from the Advanced Manufacturing Forum talks about a cause close to his heart, The Red Bench Project. The Advanced Manufacturing Forum (AMF) is a thriving membership network focused on connecting manufacturers and engineers in the North-East.Β Their mission is to foster sustainable growth, drive innovation, and share best practices. Recognising the critical need […]

Cyber Christmas Day 1! πŸŽ„ – Hall and Partners

1500 by 1000 pixels

Today, Lorna from Hall and Partners shares her thoughts on the vital role staff education plays in Cyber Security. Hall and Partners, a leading Construction and Property Consultancy based in Newcastle, deliver construction-related services from Quantity Surveying to Project and Cost Management. Upon visiting Hall and Partners, it was evident that they have a fantastic […]

The Role of IT Support in Cybersecurity and Data Protection

Cybersecurity and Data Protection

The role of IT support services in cybersecurity and data protection cannot be overstated in today’s digital landscape, where cyber threats are becoming more sophisticated and prevalent. IT support teams are critical to providing the necessary protection against cyber threats for organisations of all sizes.  Weakness identification   IT support technicians play a critical role in […]

Defending Against Cyber Attacks

image 1.jpeg

Hacking is the act of accessing or manipulating a computer system without the owner’s permission. Hackers may do this for various reasons, such as to steal sensitive information, to cause damage, or to test the security of a system. In order to successfully hack into a software, there are certain steps that hackers may take.  […]

5 Myths About Cyber Security: Debunked!Β 

image 1.png 1

Cybersecurity is a hot topic. With more businesses going online, the risk of cyber-attacks has never been higher. Unfortunately, many business owners are still in the dark about cyber security. They believe in some common myths that could put their business at risk. In this blog post, we will debunk five of the most common […]

Can Apple Passkeys Prevent Phishing Attacks?

Add a heading.jpg

Apple WWDC 2022 was held earlier this week, and they brought us some interesting news about their products and services. One of the most exciting announcements was about their new ‘Apple Passkeys’ app. This app allows you to access websites and services without the use of a password, and without sending a password over the […]

Phishing attack trends 2022

Phishing Trends 1.jpg

Cyber security attacks are on the rise, and they’re only going to become more prevalent in 2022. In this blog post, we will discuss the phishing attack trends and what you need to do to protect your business. As stated by tessian.com, 75% of businesses around the world were targeted by phishing attacks in 2020. […]

Security threats and what you should do

Businesses of any shape, size or location are constantly being targeted by malware. We have put together a jargon free guide on the different types of malware. Read our free guide here