list posts test page

suspicious email?

Suspicious Email Reporting Service

Cyber criminals love phishing. Unfortunately, this is not a harmless riverbank pursuit. When criminals go phishing, you are the fish and the bait is usually contained in a scam email or text message. The goal of phishing is to trick victims into clicking on links within a scam email or text message to install malware, or into divulging sensitive personal ...
10 tips - bright ideas

10 tips to make your home more secure

This article is focused on your home network and the devices connected to it. Here are our top tips to help you secure your home, especially whilst most of us are working from home. 1. Give your router a name Don’t stick with the name the manufacturer gave it — it might identify the make or model. Give it an ...
Cyber Essentials security guidance

Introducing Cyber Essentials – Cyber Security Guidance for Business

Cyber Essentials encourages all organisations to take basic steps to protect themselves online. But what is it? In this blog we will be looking at one of the key aspects called ‘Cyber Essentials’ certification, that not only helps businesses to identify security risks and implement steps to resolve those, but also shows potential and current customers that you care about ...

Automating compliance. Understanding the limits

I received a letter the other day. Very polite letter, not lecturing me in anyway shape or form, but it was from my bank. It provided lots of information about dealing with debt relief and charities that I could talk to about assisting me in my debt crisis. I received the letter because I had only paid the minimum payment ...

Click and Protect launch – a new approach to cyber security consulting

The founders of Cyber Security Partners (CSP) have created ‘Click and Protect’ (C&P) a bespoke, tailored service that puts clients at the heart of what C&P do by offering individual cyber security solutions to meet each client’s needs and budgets. Click and Protect are launching their new approach to cyber security consulting. Clients can now enjoy an easy process of ...