What is hacktivism?
From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
Four tips for educating users on security
IT professionals can implement as many layers of software as they want, but information security starts with the user
The history of hacking
Hacking has been around for at least as long as the computer, but the meaning of the word has shifted dramatically over the last 40 years
Why is multi-factor authentication so important?
A password isn’t enough for modern day security – it’s time to layer up
What have we learnt from the NHS ransomware attack?
The malware that made businesses everywhere WannaCry is an important case study for everyone.
The white hat brigade
In the battle against cyber-crime, many hackers are working for the common good
The truth about hacking
Hackers aren’t what you see in the movies. Find out who they are, how they work and how you can stop them.
Microsoft 'downplayed internal database hack'
But Redmond says bug-tracking database breach did not lead to exploits - report
The truth about encryption
Encryption protects our privacy, our information and our financial security, but can also obstruct the fight against terrorism and crime
The business of malware
Malware isn’t just bad software but the focus of a growing criminal industry. Find out how it works, and how it’s making millions
Hope for the best, plan for the worst
Instead of putting all their faith in protective measures, companies need to build resilience into their security systems and policies
The 10 best (or should that be worst?) malware attacks
There have been so many major cyber attacks over the years; here are the worst of the worst
Ashley Madison breach leads to $11.2m settlement
Parent company Ruby Corp will pay 37 million users - report
How to keep your printers secure
If you know that your business printers could be an entry point for hackers, what can you do to secure them?
The importance of endpoint security
Enterprise grade firewalls and rock solid server security is all well and good, but what about your printers?
Surviving human error
How can you ensure that your workers keep your business safe?
Protect your PCs from the Wolf
While nothing is ever truly safe, you can mitigate the potential damage.
Preying on your weaknesses
Just like wolves, hackers are looking for the weakest, most vulnerable prey.
Emergency patches cost companies almost $100,000 every month
Applying last-minute security fixes is hitting companies hard, says report
Two men plead guilty to TalkTalk hack
Tamworth pair admit to offences under the Computer Misuse act
Document security isn't just a digital issue
Cyber security may get all the headlines, but a physical document falling into the wrong hands can do just as much damage.
Keep The Wolf from your Data
Hackers see your printers as a weak spot and your company as easy prey. Don’t let them in.
Is antivirus bad for security?
Browser developers suggest antivirus isn't helping with security