fbpx

Governance and Compliance

do not just think about an IT and Cyber Security Audit call us now

What is involved in an IT and Cyber Security Audit?

We recommend all our clients to have an IT and Cyber Security Audit, but many business people are not sure what that involves or whether it is even necessary, particularly if the business is very small. In times of economic uncertainty, it is logical that business owners will look for value for money and an

What is involved in an IT and Cyber Security Audit? Read More »

Sender Policy Framwork

Sender Policy Framework – Phishing Email Primer (pt.10)

In the digital age, where business communication is predominantly conducted via email, the security and authenticity of these communications cannot be overstated. A correct business email setup, including Sender Policy Framework (SPF) records, is not just a technical detail but a fundamental aspect of a company’s online presence and reputation. SPF records are a type

Sender Policy Framework – Phishing Email Primer (pt.10) Read More »

Cyber Security and Humans

Cyber Security Policy

In today’s digital landscape, the significance of implementing a robust cyber security policy cannot be overstated, particularly for companies operating within the UK. Such a policy serves as the cornerstone of an organisation’s defence against the ever-evolving threats posed by cybercriminals. A comprehensive cyber security policy should encompass a clear outline of employee responsibilities, data

Cyber Security Policy Read More »

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA), is a method of authorising a login using multiple pieces of authentication. The pieces are usually defined as something the user has and something the user knows. For example, withdrawing money from a cash machine requires your valid credit or debit card (what you have) and

What is Multi-Factor Authentication? Read More »