Empowering businesses: Navigating the Cybersecurity Landscape in 2024

2024-02-27T14:11:18+00:00

In the ever-evolving digital landscape of 2024, businesses face unique challenges when it comes to cybersecurity. With cyber threats becoming more sophisticated, Absolute Networks, as your trusted IT partner, is committed to keeping you secure. Here we will explore the current cybersecurity landscape and discuss practical steps businesses can take to safeguard their digital [...]

Empowering businesses: Navigating the Cybersecurity Landscape in 20242024-02-27T14:11:18+00:00

Is it time for a company policy on the use of ChatGPT and other LLMs?

2024-01-25T14:52:53+00:00

Large language models (LLMs) have rapidly popularised since the launch of ChatGPT at the end of 2022. As an emerging technology there are many security unknowns but considering what these might be has now come secondary to the initial excitement over using this powerful and time-saving technology. Is it therefore time to rein-in unfettered [...]

Is it time for a company policy on the use of ChatGPT and other LLMs?2024-01-25T14:52:53+00:00

Russian and Iranian spear-phishing in the UK: Are your defences up?

2024-01-25T14:53:34+00:00

Russia-based group SEABORGIUM and Iran-based group TA453 are targeting UK organisations, individuals and decision makers with spear-phishing campaigns. Spear-phishing, like phishing, involves malicious links being sent via email, social media or professional networking platforms but with the difference of being highly targeted at key individuals. These campaigns are focused on gathering high-value and advantageous [...]

Russian and Iranian spear-phishing in the UK: Are your defences up?2024-01-25T14:53:34+00:00

Charities Beware: You’re a target!

2024-01-25T14:54:17+00:00

The lowest of the low! Cyber criminals see UK charities as easy pickings. Here's why charities are particularly vulnerable to cyber attacks: Regularly handle donations Hold sensitive and valuable information Precious finances and resources are focussed on front-line charitable work over enhancing cyber security Charities are more likely to rely on staff using personal [...]

Charities Beware: You’re a target!2024-01-25T14:54:17+00:00

Is your business guilty of phishing ‘blame and fear’? Is there another way?

2024-01-25T14:54:59+00:00

You hear a knock at the door and go to answer it. As you open the door the person on the other side barges past you, into your property and attempts to steal your most valuable possessions. You’re a victim of a faultless crime. Do you look through your window before opening the door? [...]

Is your business guilty of phishing ‘blame and fear’? Is there another way?2024-01-25T14:54:59+00:00

Strong Passwords, blah, blah, blah! But what really is a strong password policy in 2023?

2024-01-25T14:55:50+00:00

Most are fully aware that passwords are the gateway to your business systems and therefore weak passwords represent a massive vulnerability. Weak passwords are a form of human error: the main culprit for breaches of cyber security. Password education has for a long time suggested complex passwords with upper and lower case letters, special [...]

Strong Passwords, blah, blah, blah! But what really is a strong password policy in 2023?2024-01-25T14:55:50+00:00

9 Ways to Identify Phishing Emails

2024-01-25T14:58:18+00:00

1. An Unfamiliar Tone or Greeting - The language isn’t quite right – for example, a colleague is suddenly over familiar, or a family member is a little more formal. 2. Grammar and Spelling Errors - A common sign of a phishing email is bad spelling and the incorrect use of grammar. Most businesses [...]

9 Ways to Identify Phishing Emails2024-01-25T14:58:18+00:00

Cloud Security Advice for Nonprofits

2024-01-25T14:58:43+00:00

Leverage the full power of cloud technology while getting advanced security capabilities with Microsoft 365, which includes Enterprise Mobility + Security and Windows 10, as well as Office 365 ProPlus. With Microsoft 365, you can enable more secure collaboration by giving the right people access to information they need using an identity-based approach to [...]

Cloud Security Advice for Nonprofits2024-01-25T14:58:43+00:00
Go to Top