Damien Harrison

Phishing attacks continue to exploit COVID-19 to target businesses

Phishing attacks continue to exploit COVID-19 to target businesses

Since the start of the coronavirus pandemic, cyber criminals have exploited individuals and businesses into revealing sensitive information. A recent phishing campaign has been spotted across in the USA that attempts to steal financial account details from business users.

You Need to Watch Out for Reply-Chain Phishing Attacks

You Need to Watch Out for Reply-Chain Phishing Attacks Free illustrations of Phishing

Phishing. You can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks.

A cybercriminal may want to steal employee login credentials. Or wish to launch a ransomware attack for a payout. Or plant spyware to steal sensitive info. Sending a phishing email can do them all

How Often Do You Need to Train Employees on Cybersecurity Awareness?

How Often Do You Need to Train Employees on Cybersecurity Awareness? Free illustrations of Security

Are you training your employees enough on IT security awareness? A study found that people tend to forget what they’ve learned as soon as 6 months after training. Learn the best training interval to keep your team sharp.

Small to Medium Businesses need to understand the Cybersecurity risks to their businesses.

Small to Medium Businesses need to understand the Cybersecurity risks to their businesses. person in black long sleeve shirt using macbook pro

Small and medium Companies tend to not understand the Cybersecurity risks that may impact their companies
Understanding the risks that are present in your business takes time, energy, and knowledge of what is out there, knowing what risks are present in your business allows you to mitigate and reduce the impact of the risk.

Case Study: Bondgate IT’s Journey to Advancing Autonomy in Underwater Vehicles

Case Study: Bondgate IT’s Journey to Advancing Autonomy in Underwater Vehicles Autonomous-Underwater-Vehicles-case-study

Join us on a deep dive into Bondgate IT’s pioneering project in the seabed intervention industry. Led by Technical Director Gavin Brown, the team developed a robust, fault-tolerant system for Hybrid Autonomous Underwater Vehicles (HAUV). Discover the challenges they faced, the breakthroughs they achieved, and the legacy they’re building. Learn from their journey and get inspired to push your own boundaries.

Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

Which Form of MFA Is the Most Secure? Which Is the Most Convenient? Registration, Log In, Keyboard, Hand, Write

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack.

With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of dangerous activities.

5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office

5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office gray microsoft surface laptop computer on white table

“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working from home. This has become more than a buzzword and is now the reality for many companies