Cymraeg

Blog

Latest Posts

News

Cybersecurity reality check: the concerns of SMBs from most to least worried

Many of us have concerns about the use of technology, its security and the effects of breaches on business. But are our fears well founded or are we paranoid?    At Avast, we asked small business owners and employees about their...

15 February 2018

News

Here, there and everywhere: the cyber threats facing owner managed businesses

When cyber-attacks and data breaches hit the news, they invariably involve the largest businesses or national institutions like the NHS. But this doesn’t mean owner managed businesses (OMBs) are not under threat too. Every OMB,...

1 February 2018

News

Is your Business Cyber Savvy?

Cybercrime is an ever-growing risk that threatens both individuals and businesses around the world. Earlier this year, we consulted a panel of cybersecurity experts to find out about the biggest cyber threats that small businesses face in...

7 August 2017

News

Ransomware: ‘WannaCry guidance for enterprise administrators

Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware). Created:  14 May 2017 Updated:  17 May 2017   The NCSC are aware of a...

18 May 2017

News

A brief overview of next gen firewalls

Next gen firewalls (NGFWs) are deep packet inspection firewalls which provide a level of network security that surpasses the capabilities of traditional firewalls by moving beyond port/protocol inspection. Firewalls provide an essential function...

15 February 2017

News

Why CESG decided to advise against forcing regular password expiry

Regular password expiry is a common requirement in many security policies. However, in CESG's Password Guidance published in 2015, we explicitly advised against it. This article explains why we made this (for many)...

26 April 2016

News

The risk and rewards of wearables in the workplace

Many businesses have implemented a Bring Your Own Device (BYOD), allowing employees to use personal laptops, tablets and smartphones to access company data and resources. Some businesses have gone further and implemented a Bring Your Own...

20 April 2016

In partnership with