• Home
  • >
  • Blog
  • >
  • 11 Cyber Security Resources to Help you Be Cyber Smart

11 Cyber Security Resources to Help you Be Cyber Smart

Andy Collins

Chief Information Security Officer

Do Your Part. #BeCyberSmart is the theme of this year’s Cybersecurity Awareness Month. If you have some understanding of cyber security, it’s easy to feel as if you’re ticking this box. But are you really doing enough to protect your business from cyber attacks?

We’ve seen several high-profile organisations hit the headlines this year, reporting damaging data breaches. Many of these were the result of social engineering attacks, exposing vulnerabilities in the human element of cyber security.

These cases beg the question, could everyone – from IT professionals to employees from other departments – be doing more to protect their part of cyber space? Assuming you could be doing more, what’s going to help you take on more personal accountability and become more proactive?

The key is knowledge. You can only become more proactive if you understand the threats, the vulnerabilities in your systems, and the impact that your activity (or inactivity) has on cyber security.

As an IT professional, ‘doing your part’ also means sharing your knowledge, and helping users recognise risk and threats through regular training.

To help you when it comes to educating yourself and your colleagues, we’ve pulled together our top security blogs and videos from the past year.

You’ll find a range of resources, bringing you up to date on the cyber security landscape, highlighting where there might be vulnerabilities in your IT estate and helping you to educate your users.



For IT professionals

A Guide to Phishing

Our research on mid-market IT priorities shows time and time again that data privacy is the top priority for most businesses. One very real and complex threat to data privacy is phishing. 


Know Your Enemy: How Cyber Criminals Are Crafting Phishing Campaigns

Understand the simple method behind phishing campaigns and you’ll know what to watch out for, as well as get ideas on how to better protect your business.


Is Your Security Robust Enough for Continued Remote Working?

Our experts have a virtual catch up to discuss remote working, the current cyber security landscape, and actions that all businesses should be taking to protect themselves.


How to Manage the Cyber Security Challenges of Working from Home

The two biggest challenges are the rise in Coronavirus-related phishing email attacks and users connecting via VPN using personal devices, so let’s take each one in turn.


9 Data Protection Tips for Video Conferencing

As an organisation, your challenge is to enable the workforce to use video conferencing technologies, but in a way that is safe, secure and ensures an adequate standard of data protection.


4 Significant Data Breaches That We Can All Learn From

Data breaches are still a big problem for businesses. Here is a synopsis of some interesting cases and the lessons that we can learn from them.


Sticking with Windows 7: The Security Risks

It is estimated that around 20% of desktop computers worldwide are still running Windows 7, and this poses some significant security risks.


The Trouble with Trust: Why You Need a Zero Trust Network Architecture

As a business, you open your doors (or your network) to an array of people. An open and trusting nature is beneficial for your business, but it also brings significant risk.


Phoney Phone Lines and Sure-Fire Security: How to Prevent SIP Trunk Fraud

While businesses go to great lengths to protect their IT infrastructure against cyber criminals, there is one vital aspect of business security that is so often overlooked – securing your telephone system.


For your employees: 

Tips for Working from Home Securely

The same rules apply whether you're in the office or at home – employees must take steps to protect themselves and your organisation from cyber security breaches.


How to Spot Office 365 Phishing Emails

We’re seeing a rise in the number of phishing emails entering inboxes, especially those enticing users to enter their Office 365 credentials for the latest information, cure or tax refunds. Here’s what you need to look out for…

Of course, the threat landscape is always changing and cyber criminals are becoming ever more sophisticated with their techniques. So it makes sense to arm with yourself with the latest advice on security, IT infrastructure and services.