Invoice fraud: General reminders that stop six‑figure mistakes

Perhaps one of the most significant and damaging types of cyber incidents doesn’t involve ransomware, malware, or services going offline because a datacenter had a configuration mishap. It begins with an ordinary email. It’s not been heavily featured in the press recently, but there is an ongoing risk of supplier-orientated attacks, where the vendor you …

Hackers are using more than fake leads to steal your data

I’ve talked a lot recently about the cyber-risks associated with ‘fake leads’, and since then have received a lot of feedback from clients and followers about their real world experiences. This included a marketing agency being asked to download supporting files to produce a quotation. It all appeared very genuine, and they came very close …

Fake Sales Leads Are Targeting Companies, and They’re Getting Harder to Spot

Cybercrime has become a trillion-dollar industry. By the end of 2026, it is estimated that nearly half of global organisations will have experienced some form of malicious compromise. While a significant proportion of attacks continue to target consumers, we are now seeing an increasing and coordinated effort by cyber criminals to directly target organisations themselves. …

Cybersecurity Certifications – A powerful first step in protecting your business (and earning client trust)

The majority of businesses are facing increasing pressure to demonstrate robust cybersecurity practices, whether this is from regulators, auditors, or the less obvious and less vocal group, clients. One of the most effective ways to do this is by securing a recognised cybersecurity certification. There are several available, depending on the country in which you …

A warning for those looking to proactively automate day‑to‑day workflows

We are currently in a time when new technologies are being adopted in days and weeks, rather than months and years. This has been demonstrated with the recent and rapid adoption of AI automation tools that manage how we interact and communicate, which is going to change the way we fundamentally interact with technology. In …

2025 Cybersecurity Roundup and Action Plans for 2026

Thank you for being part of our journey this year. Whether we’ve been helping you to protect your business, collaborating as partners, or supporting you in any capacity in between, it’s been a particularly busy year for technology, and especially for cybersecurity. Before I go any further, though. If you haven’t engaged with our services …

The Cost of Doing Nothing: Why Cybersecurity Inaction Is the Biggest Risk of All

If you’re a business owner or a key decision-maker, you’re already familiar with the inherent risks of running a company. But when it comes to cybersecurity, the most significant threat may not come from external attackers, it may stem from the assumption that, “we’re probably fine.” “When it comes to cybersecurity, the biggest threat might …

The Hidden Dangers of AI Generated Content – What Business Owners Need to Know

We live in a wonderful time of convenient access to information. In almost every workflow, we are seeing AI streamline, optimise, and in a lot of cases even automate the entire pipeline negating the need for human interaction or oversight, allowing our minds to be more creative and focus on progessing humanity forwards. Today, we …

What Is Microsoft Secure Score and Why Should You Care?

You’re flat out running your business, your team is busy, and everything you rely on lives in Microsoft 365. Your emails, files, collaboration tools, client information, all in one convenient place. It feels secure enough, you’ve made sure everybody has a strong password and must log in via 2FA! Then one day, something unexpected happens. …

If cybersecurity keeps slipping down your to-do list, or has fallen off entirely, you’re not alone

In recent conversations we’ve had with firms of all sizes, we’ve seen business leaders focus on hitting year-end targets in areas such as revenue, hiring, and team stability. The problem is that hackers aren’t taking a break just because you’re busy. The trends are clear. When attention drifts, security posture declines. During and shortly after …