Reactive IT support fixes problems once they have occurred. A server might crash, your company might fall victim to a…
Author: Jake Dunn

2 Ways To Create A Strong 12 Character Password
I know that you have heard this message again and again and again, so I’m going to cut straight to…

Binance loses £31 Million In Well Planned Cyber Attack.
It was announced on the 7th that Binance, one of the world’s largest cryptocurrency exchanges, had suffered a cyber-attack that…

The Google Services That Protect You Online...Without You Realising
Browsers are a wonderful thing. They enable access to the web. What would we do without them? But, as I’m…

4 Ways Hackers And Criminals Use Social Media
A social media bot is an autonomous piece of software that controls a social media account. read more

First Solution: Three Peaks Challenge
First Solution's team of techies; Chris, Mike, Phill, and Bobby are raising money for Sight Concern, a charity dedicated to…

The End Of Passwords - The FIDO Alliance
The FIDO alliance, FIDO standing for Fast IDentity Online, is an alliance of tech companies such as PayPal, Google, Amazon,…

How Cookies Impact on Cyber Security - Part 2
In order to offer something expensive to you for free, such as news or valuable information, websites will make back…

How Cookies Impact on Cyber Security - Part 1
Cookies are an integral part of how the internet works but there is a huge amount of misinformation about them.…

Bots and their impact on Cyber Security
Bots now make up around half of all internet traffic. But what are they? A bot, short for ‘web robot’,…

The WannaCry attack and the NHS
Perhaps the most infamous cybersecurity incident of the past decade was the WannaCry ransomware attack on hospitals and NHS Trusts…

14 Ways To Protect Your Business From A Cyber Attack
There’s an old joke in the cyber security industry: there are only two types of businesses. The first are businesses…