
Tabletop Cyberattack Exercises: What, Why, How?
Tabletop cyberattack exercises involve simulating a real-world cyberattack scenario in order to battle-test an organisation’s response. Here’s everything you need to know.
Tabletop cyberattack exercises involve simulating a real-world cyberattack scenario in order to battle-test an organisation’s response. Here’s everything you need to know.
Microsoft is ending support for Windows Server 2012 and 2012 R2 in October 2023, so now is the time to upgrade or look into Extended Security Updates.
If you’re keen to discover how new AI technology could transform your business, Microsoft 365 Copilot could be just what you need.
In this edition of our new Cybersecurity 101 series, we deep-dive into the importance of passwords and Multi-Factor Authentication for your business.
Email is a vital service for any business, but are you using it securely? The NCSC Email Security Check tool will help you find out.
IT support might sound straightforward, but there are many misconceptions around it and what MSPs actually do. Here are 4 of the most common.
Microsoft Loop is a new approach to collaborative working, offering a shared interactive canvas with widget-like components which link to other Microsoft apps.
The government-backed NCSC Cyber Essentials certification scheme was updated again in April 2023 - here’s what’s changed and why.
Designing your IT support strategy is no small task, but these 5 pillars will give you a strong foundation.
In the second part of our cyber security edition of the IT Support Glossary, we look at concepts including clickjacking, data mining, drive-by downloading, and more.
Email signatures are an excellent way to unify your brand across the organisation, but they’re not easy to manage. Enter, Exclaimer.
SIEM and SOC might initially sound technical, but they represent key strategies for improving cybersecurity for businesses. Our Plain English Guide gives you the low-down.