Alex James

what is a phishing text message blog image

What is a Phishing Text Message?

How to Detect, Report and Block Smishing Attacks Just as you’ve likely received your fair share of scam emails, chances are you’ve also received some suspicious text messages. Every year, an…


Wold Health Organisation Cyber Attack blog image

Cyber Criminals Always There to Exploit a Crisis

Hacker Group Attacks World Health Organisation Following a warning released by the World Health Organisation (W.H.O) earlier this month regarding phishing emails, it has since been reported that a…


Insider Threat Sentenced to Two Years blog image

Insider Threat Sentenced to Two Years

A Chinese national has been sentenced to two years in prison for the theft of American owned trade secrets worth a reported $1 billion. A US court found Hongjin Tan, 36, guilty of theft of trade…


Six Business Critical Information Security Tips blog image

6 Business Critical Information Security Tips for SMEs

Regardless of whether you’re part of an international corporation or an up-and-coming SME, information security should be considered an integral part of not only IT, but as critical to management…


The Essential Anti-Phishing guide for SMEs blog image Hut Six Security

The Essential Anti-Phishing Training Guide for SMEs

Information Security Basics When considering the basics of information and cyber security, it’s sometimes tempting to think that we are in the group that are ‘too smart’ to be fooled by anything…


business continuity plan blog image

What to Do if you Don’t Have a Business Continuity Plan

Business as Usual? In times of sudden change, be it a natural disaster, electronic failures or global pandemics, having a business continuity plan is essential for an organisation determined to…


Phishers Exploiting COVID-19 Coronavirus blog image

Phishers Exploiting COVID-19 Coronavirus

Protecting yourself from Malware, Ransomware and More With the amount of global coronavirus infections passing 90,000, there is no shortage of opportunists, scammers and criminals lining up to…


Security is no picnic blog image

SME Security is No Picnic

Problem in Chair Not in Computer There are many issues that organisations can encounter when dealing with information security; from lost files and credential sharing, to protecting intellectual…


How does the data protection act protect businesses blog image

How Does the Data Protection Act Affect Businesses?

Rights, Obligations and Important Concepts The UK’s Data Protection Act 2018 was developed not only to significantly update the DPA 1998, and data protections fit for purpose in an increasingly…


Google warning over Huawei devices blog image

Google Warning Over Huawei Devices

Huawei Concerns Continue Having been essentially banned from any form of collaboration with the Chinese technology giant Huawei since May of last year, Google has restricted the access of any new…