Blogs.

Read our blogs for the latest cyber security updates.
Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

Empowering security: the battle against Login Spoofing

Introduction Battling cyber-crime can sometimes feel like an endless tennis...

A case of ransomware, resolved

...

Cyber in logistics 2023: Hello new growth! Hello new risks...

Sustainability. Growth. Digitalisation. These are the words everyone’s using...

Microsoft Teams Chat: the rising phishing threat and how to stop it

Introduction Around mid-September, our Security Operations Centre (SOC)...

featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

The silent crisis: IT burnout due to increased cybercrime

Employee absenteeism is rising among IT managers and employees, as are burnout...

featured-image

NIS2: how will it be transposed in European countries?

The NIS2 Directive is the latest European cybersecurity regulation, aiming to...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration

European Union working on new security directive

The impact of the new 'cybersecurity' directive, NIS2, on insurers Although the...

featured-image

Cyber insurance: your safety net in an increasingly risky world

To minimise the impact of a cyber incident, preventive security measures must...

featured-image

Eye Security sounds the alarm: the chance of being hacked is 1 in 5

In recent years, we have seen an increasing number of cyber attacks on...

1 2 3

Are you ready to get started?

See how affordable complete protection can be for you