Davey Winder
How secure is Gmail?

Security
How secure is Gmail?
The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkups
23 Jun 2022
How to react to a data breach

Security
How to react to a data breach
Would you know what to do if an online attacker got their hands on your data? We outline the first steps you should take following a security breach
22 Jun 2022
Using Google Takeout to reclaim your data

privacy
Using Google Takeout to reclaim your data
Everyone knows your data drives the Google machine, but now you can find out exactly what it holds on you
11 Jun 2022
Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive

hacking
Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive
So, you want to be a hacker? We share the best advice and resources for getting started
7 Mar 2022
DDoS attacks are still a key weapon for corporate extortion

distributed denial of service (DDOS)
DDoS attacks are still a key weapon for corporate extortion
Ransomware isn’t the only rotten fruit, with DDoS attacks deployed both as an extra twist of the knife – and on their own
26 Jan 2022
Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular

information security (InfoSec)
Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular
Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC
15 Dec 2021
Facebook for business: know the risks

facebook at work
Facebook for business: know the risks
The social media giant has some great features for businesses, but there are hazards too
16 Aug 2021
The truth about ransomware

Security
The truth about ransomware
Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
The truth about ransomware

Security
The truth about ransomware
Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
Secure your Wi-Fi against hackers in 10 steps

Security
Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Secure your Wi-Fi against hackers in 10 steps

network security
Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020
What is NoOps?

DevOps
What is NoOps?
There are numerous approaches to in-house development; we explore one that focuses squarely on efficiency
4 Jul 2020
Why and how I enrolled in Google’s Advanced Protection Program

cloud security
Why and how I enrolled in Google’s Advanced Protection Program
Physical security keys are at the heart of the company’s efforts to protect high-profile targets
28 Apr 2020
Remote support is a fact of life… 

remote access
Remote support is a fact of life…
Now you need to deal with the security risk
11 Apr 2020
Does your business need its own VPN?

virtual private network (VPN)
Does your business need its own VPN?
You might assume that a company VPN is overkill for small businesses, but it's increasingly a necessity for most businesses
23 Mar 2020
If not passwords then what?

cyber security
If not passwords then what?
Google and Microsoft have both talked up a passwordless future, but what does that mean and is the technology ready to make it happen anytime soon?
8 Jan 2020
Compromising email accounts is easier than you might imagine

Security
Compromising email accounts is easier than you might imagine
Why you should take steps to protect your business from zombie phishing attacks
11 Aug 2019
The A-Z of security threats 2018

Security
The A-Z of security threats 2018
Industry experts give their thoughts on the growing range of threats facing modern businesses
3 Oct 2018
What is a cyber kill chain?

cyber attacks
What is a cyber kill chain?
How understanding the progression of an online attack can help you defend your business
13 Jul 2018
Social engineering: your business' biggest security risk

social engineering
Social engineering: your business' biggest security risk
It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
Move over VMs, the future of app deployment is in containers

virtualisation
Move over VMs, the future of app deployment is in containers
A look at a more flexible and efficient way to isolate and modularise your apps
10 Apr 2018
Secure your Wi-Fi against hackers in 10 steps

network security
Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
5 Feb 2018
How to build web traffic without turning to the dark side

Network & Internet
How to build web traffic without turning to the dark side
You can buy links and likes, but they won’t do you any favours in the long-run
3 Nov 2017
How to protect against cyber threats

Security
How to protect against cyber threats
IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
Brace yourself for Brexit

public sector
Brace yourself for Brexit
Leaving the EU is supposed to give British businesses a boost, but it might not be as simple as that
30 May 2017
Why SMBs need a good disaster recovery plan in place

Security
Why SMBs need a good disaster recovery plan in place
Work in a small business? Then you’re a target for ransomware
14 May 2017
Why UK government must get strategic about cybersecurity

Security
Why UK government must get strategic about cybersecurity
Government investment in cybersecurity is great, but what matters is where the money goes
22 Feb 2017
How to carry out workplace email surveillance 

Security
How to carry out workplace email surveillance
Want to monitor employee communications? Davey Winder explains your rights and obligations
19 Sep 2016
Five security threats Windows 10 protects you against

Security
Five security threats Windows 10 protects you against
Love it or hate it, Windows 10 is a pretty secure OS
9 Aug 2016
Four cheap dark web cyber threats

hacking
Four cheap dark web cyber threats
Hackers are turning to the dark web for cheap exploits - here's how to protect your business
29 Jun 2016
Five weirdest password alternatives of all time

Security
Five weirdest password alternatives of all time
Computers can identify you based on your butt and your walk, not to mention your smell...
14 Jun 2016
Privacy is the collateral damage in our war on terror

Security
Privacy is the collateral damage in our war on terror
More UK citizens must value privacy for government to leave our data alone
23 May 2016
Ethical hackers are finally getting their rewards

hacking
Ethical hackers are finally getting their rewards
For too long, the unsung heroes of cybersecurity have been undervalued
3 May 2016
Why a nation state isn't behind the Panama Papers hack

hacking
Why a nation state isn't behind the Panama Papers hack
Mossack Fonseca had its data stolen via an embarrassingly easy security flaw
11 Apr 2016
Encryption is a touchy subject for the Home Office

Security
Encryption is a touchy subject for the Home Office
Theresa May's Modern Crime Prevention Strategy: strong on rhetoric, light on security measures
24 Mar 2016
Budget 2016: What about cybersecurity spending?

Opinion
Budget 2016: What about cybersecurity spending?
George Osborne's failure to explain how cyber budget will be spent was a missed opportunity
16 Mar 2016