Blog

blog
January 6, 2026
Cybersecurity Statistics 2026: What the Numbers Really Tell Us

The statistics from 2025 make one thing clear: threats are accelerating faster than most organisations can adapt. Artificial intelligence, supply chain complexity, and evasion-focused attack techniques now define the threat landscape. To prepare for 2026, organisations must prioritise active defence strategies, employee training, zero-trust architectures, and continuous validation of third-party integrations. Cybersecurity is no longer a static prevention problem, it is an ongoing resilience challenge.

Read more
blog
May 16, 2024
7 Steps To Secure Your Microsoft 365 Environment

Microsoft 365 is trusted by organisations large and small for their day to day operations. Email, data storage, document exchange, customer and company critical information are all entrusted to 365 for safe keeping. And yet out-of-the-box, or out-of-the-cloud as is more common, Microsoft 365 security features are configured for usability, rather than maximum security.

Read more
blog
February 15, 2024
Communicating Cyber Security Risk to the Board

Communicating cyber security risk to the board can be a key function of senior security roles. While cyber risk oversight is a function of the board, be it fully or partially shared with internal teams such as the audit committee, the implementation, actual operation and management of the security program is not their responsibility

Read more
blog
February 15, 2024
How to secure Microsoft Office Desktop Deployments – A Technical Guide

Microsoft has been pushing browser-based Microsoft 365 cloud for all office functions. However, their desktop office applications are just as popular as ever – especially Word, Excel and PowerPoint. Which is great news for cyber criminals as the end user workstation is a prime target for attack and often an overlooked link in any cyber security strategy.

Read more