Mark Poulding

Prevent Spoofing and Impersonation Emails using DKIM and DMARC

We have all received emails that look genuine but turned out to be a spoof or impersonation. Imagine if your clients were to receive an email spoofing your organisation. This is where DKIM and DMARC can be activated to combat impersonating your organisation. In this article, we explain:

4 Reasons Why SMEs Should Invest in Cybersecurity

Most small businesses would like to think that they aren’t a target of cybercriminal activity. ...

A guide to improving Wi-Fi router security

Protecting a wireless connection is essential housekeeping for ensuring the integrity of your...

Cybersecurity self-assessment questionnaires

What questions are included in a supply chain cybersecurity self-assessment questionnaire?

How do I...

IASME Cyber Essentials FAQs

IASME Cyber Essentials was introduced by the UK Government to help small businesses tackle cyber...

Guide to Autosave & Version History: restoring previously saved file versions

There was a time when losing your work was a reality if you forgot to press save. However, today,...

BT switch off analogue phones

Technology constantly moves forward and this is true for our phones systems and business telephony....

Cyber Essentials Checklist: Is your IT company competent to help you pass?

Many businesses turn to their IT company to help them pass Cyber Essentials accreditation. The...

On-premise Microsoft Exchange Server vulnerability

The on-premise Microsoft Exchange Server vulnerability has revitalised the ongoing debate; Cloud vs...