We are thought leaders and love sharing our knowledge.


Protecting our Clients from Email Spoofing – Our DMARC Journey


Most organisations have been successful to some extent in blocking malicious emails targeted at their employees. Various on-premise and cloud providers exist to take care […]

Read More… from Protecting our Clients from Email Spoofing – Our DMARC Journey

Three letterboxes.

Narrowboat Nightmares Continued: How Threat Intelligence Could Have Saved Me Thousands


So here’s another fun story around my narrowboat nightmares, if you didn’t catch the last one, I would recommend giving it a read here. This […]

Read More… from Narrowboat Nightmares Continued: How Threat Intelligence Could Have Saved Me Thousands

Canal with narrowboats.

Phishing, Delays & Incidents


+218 min traffic delay for a 55 min drive after a brief flurry of snow gave me time to make a lot of calls and […]

Read More… from Phishing, Delays & Incidents

Cyber logs and human eye.

Thrown into the Deep End


Scuba diving was one of those activities that I’d always wanted to try out, but for one reason or another (namely a deep-seated fear of […]

Read More… from Thrown into the Deep End

Fish, shark and coral reef.

Cyber Insurance – Still a Valid Tool for Risk Management?


Insurance providers over recent years have dipped their toes in the water in the provision of Cyber-Insurance to organisations. Digital Transformation has made computer systems […]

Read More… from Cyber Insurance – Still a Valid Tool for Risk Management?

Phishing for the Catch of a Lifetime


Awaking bleary eyed to that unprecedented sound of an alarm going off is the bane of most working people’s lives 5 or 6 days a […]

Read More… from Phishing for the Catch of a Lifetime

Landscape of fishing rods along the side of a lake.

Calling Cyber-Security’s Bluff


For those that know me at a personal level, they know I am a keen poker player. I’ve been fortunate to make some great friends from […]

Read More… from Calling Cyber-Security’s Bluff

Poker chips and playing cards scattered on a table.

3D Printers,Cyber-Security and the Build vs. Buy Decision


While browsing the Black Friday offers for Christmas presents, I stumbled upon a 3D printer for the bargain price of £130. The only caveat being […]

Read More… from 3D Printers,Cyber-Security and the Build vs. Buy Decision

3D printer printing out a red human hand.

Narrowboat Nightmares and Cyber-security


I’ve lived on a narrow-boat for about 6 months and I’ve learnt that it shares many similarities with my job in IT security. As peculiar […]

Read More… from Narrowboat Nightmares and Cyber-security

Competing and Innovating with Confidence


Digital Transformation rolls on, and business will not wait for security to catch up. Embracing technology change and modern ways of working can lead to […]

Read More… from Competing and Innovating with Confidence

Jon Speirs playing real tennis.
Load more

We’ll get you where you want to go. Securely.


With agile cyber security strategy, support and services that work in tune with your business.