Network Segmentation and Host Isolation

Network segmentation is when you separate different network devices (PCs, printers and other network-enabled devices) from one large local area network (LAN). The separated groups are called Virtual LANs or VLANs. This is so different groups of systems cannot interact with others, this can stop malicious users or malware spreading throughout the network without restrictions. […]


What is GDPR? GDPR stands for General Data Protection Regulation. It gives offers more rights and freedoms to individuals living in the EU to control and access their data. There are 8 rights of the individual; these are: The right to be informed – Data subjects have the right to be informed about how their […]

Penetration Tests vs. Vulnerability Assessments

When shopping for security for your networks, several web application terms get thrown around. Due to this, non-technical people such as CEO’s and management may not understand these terms and may make the wrong purchase. When thinking about your digital security, you may think that by having an anti-virus system, a top-end firewall or even […]

Our Guide to Penetration Testing

What is Penetration Testing? Penetration testing — or pen testing — is a cybersecurity measure used to assess a range of digital systems, applications and networks. Imitating the movements of a hacker, a penetration tester will try to work their way around your system’s security. Penetration testing should be conducted in an ethical manner, keeping legitimate business security at the forefront. Do I […]

Cybersecurity: In-House or Outsourced

Choosing between in-house and outsourced cybersecurity is a big decision you must make as a business owner. There are pros and cons to either choice and it’s up to you to decide which makes more sense for you. What are the advantages of having a cybersecurity department in-house? Constant Monitoring – With your cybersecurity taken […]

Five Personality Traits of Hackers

Following on from last week’s article on black and white hat hackers, we found an interesting study on the personality traits of hackers. The research includes a grouping of personality indicators that was developed in the 80s and is still used today. The traits are as follows: Trait Sample Statement Agreeableness “I have a soft heart.” Conscientiousness “I am always […]

White and Black Hat Hackers: FAQ Answered by Our Hacking Team

White and black hat hackers are the good and evil of the hacking world. Black hats are those who hack their way into other peoples’ systems without permission and for their own gain, whereas white hats (such as Samurai) are ethical hackers that have permission to hack into systems and find the insecurities within their […]

FAQ on Phishing

After a bit of looking around, I managed to find some of the most frequently asked questions about phishing. Let’s see if we can’t clue some people in. What does phishing mean? By definition, it means; ‘the fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, […]

Donald Trump’s Coronavirus Health Hack

Just in case you didn’t think that hackers will capitalise on literally anything to spread their malware, they’ve used Donald Trump’s diagnosis of Covid-19 to get people to open the gateways to their malware. Last Friday, US President Donald Trump tested positive for Coronavirus and had to spend time the weekend in hospital. So close […]

‘Will Cybersecurity Ever Die Out?’

When researching questions that are currently asked about cybersecurity, I came across ‘will cybersecurity ever die out?’ I found this question to be interesting as it’s a complex and rather odd question but, the more I think about it, the more interested I get so… Will Cybersecurity Ever Die Out? In short, no, and especially […]