It’s been eight months since my last blog post, having taken on a new job, been on the receiving end of a full-on enterprise ransomware attack (that wasn’t nice!) and quite frankly experiencing one heck of a baptism of fire - I felt it was time do write a quick blog post tip!read more

Recently I decided to hold a short(ish) staff training session on how to spot internet / email scams. The catalyst behind this, was primarily due to the sheer amount of helpdesk queries being received, pertaining to whether a particular website or email was genuine etc.read more

Let’s face it, information security is important.  With more and more data being stored and accessed via the internet, we are becoming increasingly reliant on “third parties” to secure our personal data responsibly.  So how is it that we are seeing so many data breaches and poor practices?read more

As I have mentioned in previous blog posts, I regularly listen to numerous technical podcasts.  A relatively new edition to my listening collection is the information security podcast Risky Business – it’s great!read more

Most users of Office 365 will no doubt be aware of the Clutter folder; for the most part this Clutter folder works pretty well.read more