Blogs.

Read our blogs for the latest cyber security updates.

The story of a real vishing attack: detailed incident walkthrough

Introduction In this article, we'll cover the following: Context on vishing...

Microsoft Teams Phishing: How to Stop The Rising Phishing Threat

Introduction Around mid-September, our Security Operations Centre (SOC)...

featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

Hunting for You and Eye #1

Eye Security's ongoing hunt for cyber threats provides valuable insights into...

featured-image

The silent crisis: IT burnout due to increased cybercrime

Employee absenteeism is rising among IT managers and employees, as are burnout...

featured-image

Security Alert: Critical Geoserver Vulnerabilities

We want to bring your attention to a critical vulnerability in GeoServer that...

featured-image

NIS2: how will it be transposed in European countries?

The NIS2 Directive is the latest European cybersecurity regulation, aiming to...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration
featured-image

When it comes to cybersecurity, insurers set the bar high

The insurance market is now aware that cyber risk is difficult to manage and...

European Union working on new security directive

The impact of the new 'cybersecurity' directive, NIS2, on insurers Although the...

featured-image

Cyber insurance: your safety net in an increasingly risky world

To minimise the impact of a cyber incident, preventive security measures must...

Are you ready to get started?

See how affordable complete protection can be for you