Skip to main content
Lee Foster
Written byLee Foster

What is vCIO and what are the benefits?

A Virtual Chief Information Officer (vCIO) is like having an IT expert in your corner—without the cost of a full-time exec. They provide strategic tech guidance on a flexible, part-time basis,…

Vincent Sharp
Written byVincent Sharp

Windows Modern Management

With Microsoft closing the chapter on Windows 10 in October…

Simon Evans Headshot
Written bySimon Evans

What is physical penetration testing and how can it help my business?

Physical penetration testing is a method used to assess the security processes and protocols of an organisation. It involves evaluating the effectiveness of physical security controls and staff…

Vincent Sharp
Written byVincent Sharp
Modern Workplace

Closing the chapter on Windows 10 and upgrading to Windows 11

Once upon a time, Microsoft promised that Windows 10 would be ‘the last version of Windows’ but alas, it was not to be.  October 14, 2025 marks the end of Windows 10 support, meaning…

Callum Headshot
Written byCallum Lake
Cyber Security, Cyber Security Strategy

The dangers of deepfakes

With the rise in use of Artificial Intelligence across all areas of life, there has also been a rise in its malicious usage.

Sean Brown
Written bySean-Francis Brown
Cyber Security, Cyber Security Strategy

Critical vulnerabilities in remote access tools expose industrial networks to cyber threats

Claroty’s Team82 recently discovered a critical vulnerability in industrial networks: the widespread use of insecure remote access tools (RATs) in Industrial Control Systems (ICS) and Operational…

Damon Headshot
Written byDamon Brooker
Cyber Security, Cyber Security Strategy

North Korea aggressively targeting crypto industry with well-disguised social engineering attacks

North Korea is currently conducting an aggressive campaign against the crypto industry using well-disguised social engineering attacks.

Alex Headshot
Written byAlex McIntosh
Cyber Security, Cyber Security Strategy

Russian military cyber actors target U.S. and global critical infrastructure

The UK, alongside nine international allies, has publicly attributed a campaign of malicious cyber activity to Russia’s GRU Unit 29155.