View Update Google Chrome browser

Update Google Chrome browser

Attention customers, if you are using Google Chrome Internet browser on your Windows, Mac or Linux computers, you need to update your web browsing software immediately to the latest version of Google Chrome released earlier this week. A security vulnerability was found in a previous release of Chrome which could allow hackers to hijack your…

Read More


View Download Email Hijacks our new cybersecurity eBook

Download Email Hijacks our new cybersecurity eBook

Modern Networks have written a new 20-page cybersecurity eBook called Email Hijacks to help businesses gain a better understanding of email phishing attacks, and what you can do about them. The book is written in plain English, keeping technical jargon at an absolute minimum. First, we explain some of the most common methods of phishing…

Read More


View Supply chain attacks set to increase in 2020

Supply chain attacks set to increase in 2020

Supply chain attacks were up 78% in 20191. Research by cyber-security company CrowdStrike, found that two-thirds of businesses had suffered a supply chain software attack during 20182. It’s a trend that looks set to continue during 2020. After all, why attack a well-protected target directly when you can bypass its security altogether? What is a…

Read More


View Press release: Security Awareness Training

Press release: Security Awareness Training

Nine out of ten successful cyber-attacks start with a phishing email. Cybercriminals use sophisticated social engineering techniques to dupe unwary members of staff into opening malicious email attachments or clicking on bad links. According to a recent Datto survey, one in five SMBs has fallen victim to a ransomware attack. That same survey found that…

Read More


View Commercial property: cyber security checklist

Commercial property: cyber security checklist

Today, more and more commercial properties are adopting smart technologies to improve energy efficiency, monitor equipment, automate routine maintenance and collect data. Similarly, Space-as-a-Service tenants’ demand access to the latest IT and telecommunications. Of course, more technology demands better safeguards against cyber-attacks. Property firms must also “take appropriate security measures” to meet data protection obligations….

Read More


View The rise and rise of ransomware

The rise and rise of ransomware

Ransomware made worldwide headlines with the devastating WannaCry attack of May 2017. WannaCry cost the NHS £92 million and forced the cancellation of 19,000 medical appointments. Nevertheless, two years later, over a million computers remain vulnerable to WannaCry and similar types of malware. Anyone who thinks ransomware has gone away is very much mistaken. Massive…

Read More


View Security first

Security first

The technology landscape is always changing. Its inhabitants evolve and predators adapt. In order to survive, organisations and individuals must adopt a security first mentality. For organisations, security cannot be an afterthought. Instead, it must be planned and built into the fabric of your IT infrastructure. You also need clear security policies that are regularly…

Read More


View GDPR and cyber security readiness

GDPR and cyber security readiness

Media hype around GDPR (General Data Protection Regulation) has produced considerably more heat than light. GDPR is the European Union’s replacement for things like the UK’s Data Protection Act (1998). The new regulations come into effect 25th May 2018. All companies wishing to trade with the EU must be GDPR compliant. The UK will adopt…

Read More


  1. Pages:
  2. 1
  3. 2