Beware of Online File Converter Scams: Protect Your Business

The FBI Denver field office has issued a warning about a rising scam involving free online document converter tools. I thought it best to take the opportunity to reflect upon what this actually means and who is most at risk. These types of online tools were created as an online efficiency; the ability to open …

Cyber Security tips for Businesses – by Jordan Gall

Cyber security continues to shape the tech landscape, especially for small and medium businesses. From strengthening defenses and embracing Cyber Essentials (or similar certifications), to increased vendor practices and wider adoption of Zero Trust, there are some clear trends. As a cyber security professional, I want to share some simple yet essential tips to keep …

3 Tech Essentials to Keep Your Business Safe(r) from Hackers in 2025

Modern businesses rely on technology more than ever to operate and engage with clients. As we progress through 2025 and the next tech evolution with AI, it’s critical that your tech works for you – not against you.  In today’s article, I want to share three essential tech tips designed to help business owners and …

Microsoft Secure Score – Is Your Guard on Duty?

Would you rather have a security guard for your business who is vigilant, well-trained and knows what to look out for and how to respond to different situations, or a security guard that is inattentive, poorly trained, and might be more interested in their phone than their surroundings?…  Your Microsoft Secure score is essentially the …

Jordan’s Top Tips for Protecting Your Business (Audio Clip)

As a cyber security professional, I often get asked this question. As business owners, there are some things you can do on your own. Without a team, difficult to do. Here’s the things you can do yourself. I’m a strong advocate of using technology in all aspects of business, and with that comes the responsibility …

2025 Technology Trends: Key Predictions for a More Secure Future

After a busy 2024 and an accelerated shift toward agile working, I have been looking ahead with the Buchanan Technology team at at the developments that will shape the technology industry in 2025. In this article, we outline our predictions for the coming year and explain how these trends could impact your business.     Cybersecurity …

Hey, Jordan – What are your top cyber security tips?

As a cyber security professional, I often get asked this question I think the legacy view that hackers are only targeting big multi-national corporations or governments is highly outdated. The reality is that most attacks are automated and seek out the weakest businesses via flaws in a particular system that have long gone unattended, which …

Don’t be part of the 95% of cyber breaches that are caused by human error

For years, human error has been the Achilles’ heel of cybersecurity, with 95% of all successful breaches being caused by user error and negligence, often caused by a lack of training or awareness.    This underscores the critical importance of cyber education, particularly for regulated and advice-based industries such as finance, where protecting sensitive client data, …

Stay ahead of bot attacks with smart cybersecurity

Bot attacks don’t discriminate—they target any business, regardless of size or industry. These automated cyber threats crawl the internet, find weaknesses, and strike to steal data, disrupt operations, or cause financial damage. “They don’t have an agenda. They are designed to cause harm, downtime, and to farm your data. That’s why it’s critical to maintain your public-facing technologies—your …

We’re not sure why the UK National Cyber Security Centre doesn’t require this key feature

Cyber Essentials, the UK government-backed certification that’s highly recommended for financial institutions to use as a starting reference point for securing users and client data, does not mandate the use of encryption. This certification, provided by the National Cyber Security Centre (NCSC), is a vital framework for businesses looking to bolster their cyber security posture. …