Blog

Our latest Posts

Setting Up Parental Controls on Apple Devices

We all know that the internet can be a dangerous place for children. That’s why it’s important to set up...

Next DNS Logs

We use Tailscale which is amazing and have started using NextDNS for DNS lookups. I wanted to get the logs into our...

How to reset your device before you hand it to someone else

Last week I was asked “what would I need to do before I give my computer to my son?” The client had an old windows...

Why Serverless

Serverless is truly coming of age this year as demonstrated by the announcments last week at AWS Re:Invent. Serverless...

Top Tips for Looking After Your Email Reputation

You’ve heard the saying, “Reputation is everything”? Nowhere is this truer in the modern world than online. Ignore the...

Why organisations still need Cyber Essentials certification, even if they have ISO27001.

It is a question we are often asked, “does a business still need Cyber Essentials certification if they have ISO...

5 Ways to Keep your Child Safe Online

The school have just asked us to buy a laptop for child number 1. They have given us a bit of advice on how to secure it...

Secure your employees personal accounts

I have been delivering some security architecture work and programme security to a client on a sensitive programme....

Secure your Office 365 Admin Account

I was listening to this Black Hills Infosec Podcast (this is an excellent resource if you want to get into the technical...

Use Multi Factor Authentication

Use Multi Factor Authentication (MFA or 2FA) You may have heard of multi-factor— or two-factor — authentication as a way...

Remove unwanted applications

Social Media sites such as Facebook and twitter encourage you to enable “apps” that work their platforms,...

Update your software regularly

Software and app updates contain vital security fixes to help protect your devices from attackers. Modern software is...

What is Cyber Essentials?

Cyber Essentials is a certificate that demonstrates a Company applies the security controls that stop 90% of the attacks...