Remote desktop protocol (RDP) is a common way to connect to a Windows computer remotely. Though this is can be very usef
Business email compromise is when an attacker gets access to an employee’s email account without their permission to car
Phishing scams are one of the most common, prolific and successful attacks we see. It’s important to know how to protect
Targeted email scams to your business are harder to spot so you’re more likely to trust them.
'Insider threat' is the term used to describe a malicious threat to a business or organisation from someone who has insi
A data breach is when private and confidential information is released into an unsecured environment. This usually means