Archives for Cyber Essentials

Cyber Threat Maps

Cyber attacks are real, continuous and potentially affect every internet connected device. The threat maps below each show different information about “real-time” attacks. We are sharing these with the intention of informing clients not creating fear. All Is Not Lost!! Whilst these live attack maps show a very real and concerning level of threat across the globe, there are also a plethora of protection options available. Computer security, much like home security, is an investment, and it’s important to spend your money on the protection options and levels that fit your needs – from basic anti-malware protection (window locks), to
Read More

Secure Your Internet Connection

Secure Your Internet Connection Cyber Essentials prioritises a secure internet connection – this focuses on two elements: Use a firewall Boundary firewall Personal firewall Minimise remote access Block remote access by default Only allow business justified remote access
Read More