Yusra Shaeik

What is IASME Cyber Assurance (and who needs it)?

If you’re looking for a higher cybersecurity standard for your business – something to help you reassure investors and attract new clients – IASME Cyber Assurance could be it. But what is IASME Cyber Assurance exactly? Who needs it? And what sort of business is it the right choice for? Because, from the outside, cybersecurity

What is ISO 27001 (and who needs it)?

ISO 27001 is a key Information Security standard. For businesses that regularly hold onto sensitive data about their clients and want to demonstrate the highest standards of security, it can be an important standard to meet. Because the cybercrime risk to everything from financial information to Intellectual Property to patient safety can be huge. It

Phishing vs. Spear Phishing (and how to prevent both)

Data protection has never been more important for businesses of every size. This is because of the massive rise in costly (£160 000 on average) cyber attacks. Of these attacks, phishing and spear phishing are among the most common – and effective. Roughly 2 out of 3 SMEs suffered some degree of cyber attack last

Cybersecurity and User Experience – how to strike a balance with Microsoft 365

If your cybersecurity and user experience aren’t in balance in your installation of Microsoft 365, you’re setting yourself up for trouble. This is for two interlocking reasons: One, cybersecurity has an (often undeserved) reputation for making life more difficult. However, skipping good cybersecurity costs businesses millions of pounds every year. Second, the more that something

How can I speed up my Outlook?

“Why is my Outlook running so slowly?” It’s a question that regularly echoes around offices throughout the land. If figuring out how you can speed up your Outlook is an ongoing issue, fear not – this article is for you. Here’s why your mail client is running slowly: It’s probably all about your email cache…

What is Business Email Compromise? (And why is it so dangerous?)

Business Email Compromise attacks are on the rise. This kind of sophisticated cyber attack uses legitimate-seeming emails to convince you or a member of your team to send money or sensitive data. The best BEC attacks are nowhere near as easy to detect as you might imagine. And for thousands of businesses around the world

How not to compromise cybersecurity while maximising your productivity

One of the biggest objections to good cybersecurity practices from business owners is the imagined hit to productivity. Luckily, the latest security measures don’t reduce your productivity. They boost it. The combination of MFA (Multi-Factor Authentication) and SSO (Single Sign-On) gives you excellent security while streamlining your team’s workflows. They aren’t complicated to put in

What is Single Sign-On (and why might your business need it)?

One password for this app. Another for that device. An IT team constantly fielding login reset requests. If that’s your business’s daily reality, Single Sign-On could be just the thing you’re looking for. This already widely-used authentication scheme means you only need a single ID to log onto a whole bunch of individual (though related)

Advanced threat protection against phishing: how to protect your business

Over 9 out of 10 cyber attacks start with an “innocent” email. That’s why it’s vital that you have advanced threat protection against phishing in place and ready to protect your business. Because, unfortunately, the human link in your cybersecurity chain is almost always weaker than your other defences. Your first fix is easy, of

Google Meet vs Teams – what’s better for business use?

Google Meet vs Teams. It’s become a perennial question for decision-makers. Out of the two big names in workplace collaboration, what’s better for business use? Let’s take a look at it from a couple of different angles: Is Google Meet better than Microsoft Teams? This is one of the most common ways to phrase the