IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Davey Winder

Davey is a three-decade veteran technology journalist specialising in cybersecurity and privacy matters and has been a Contributing Editor at PC Pro magazine since the first issue was published in 1994. He's also a Senior Contributor at Forbes, and co-founder of the Forbes Straight Talking Cyber video project that won the ‘Most Educational Content’ category at the 2021 European Cybersecurity Blogger Awards.

Davey has also picked up many other awards over the years, including the Security Serious ‘Cyber Writer of the Year’ title in 2020. As well as being the only three-time winner of the BT Security Journalist of the Year award (2006, 2008, 2010) Davey was also named BT Technology Journalist of the Year in 1996 for a forward-looking feature in PC Pro Magazine called ‘Threats to the Internet.’ In 2011 he was honoured with the Enigma Award for a lifetime contribution to IT security journalism which, thankfully, didn’t end his ongoing contributions - or his life for that matter.

You can follow Davey on Twitter @happygeek, or email him at davey@happygeek.com.

Lab-based cyber attacks are no serious threat – yet
A cyber security researcher at their desk
cyber security

Lab-based cyber attacks are no serious threat – yet

There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter
19 Nov 2022
How to react to a data breach
Open padlock on circuit board
Security

How to react to a data breach

Every business should have a data breach response plan, but when building one it can be difficult to know where to start
14 Nov 2022
The rising tide of no-hook phishing
An anonymous mobile phone user using their device in a darkened room
phishing

The rising tide of no-hook phishing

Not all phishing attacks rely on links or attachments, which means you’ll have to be extra careful
12 Nov 2022
Six cyber security holes you need to plug now
Graphic with hexagonal tiles with a lockpad and one tile with an unlocked lock pad against a red background
cyber security

Six cyber security holes you need to plug now

We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
8 Nov 2022
The sooner the FIDO Alliance can shut down passwords, the better
A greyscale hand emerging from a hole, removing a password string, against a blue background
information security (InfoSec)

The sooner the FIDO Alliance can shut down passwords, the better

Passwords aren’t going anywhere, but that hasn’t stopped the dream of a passwordless future – and it seems that Apple, Google and Microsoft agree
22 Oct 2022
Google’s Project Zero is frightening and reassuring in equal measure
Female IT programmer working on a desktop computer in data centre
cyber security

Google’s Project Zero is frightening and reassuring in equal measure

This crack team of security researchers are doing work we should all be grateful for
10 Sep 2022
Brave pushes the boundaries of privacy by design
The Brave browser icon in the background behind somebody using their phone
privacy

Brave pushes the boundaries of privacy by design

It’s quite a big step to abandon the big three of Chrome, Edge and Safari for a niche option that doesn’t just tack privacy on top
6 Aug 2022
QR codes are just as insecure as anything else
Smartphone scanning a QR code
Security

QR codes are just as insecure as anything else

A browser locked down tighter than a duck’s derriere won’t save you from phishing attacks – but getting to grips with the latest advice and best pract…
9 Jul 2022
How secure is Gmail?
A smartphone on a keyboard showing the Gmail loading screen
Security

How secure is Gmail?

The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkups
23 Jun 2022
Using Google Takeout to reclaim your data
Several anonymous faces imposed with binary to represent privacy
privacy

Using Google Takeout to reclaim your data

Everyone knows your data drives the Google machine, but now you can find out exactly what it holds on you
11 Jun 2022
Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive
Graphic of a hacker walking through a digital corridor
hacking

Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive

So, you want to be a hacker? We share the best advice and resources for getting started
7 Mar 2022
DDoS attacks are still a key weapon for corporate extortion
Visual representation of an active botnet, with several black nodes connected with white strands
distributed denial of service (DDOS)

DDoS attacks are still a key weapon for corporate extortion

Ransomware isn’t the only rotten fruit, with DDoS attacks deployed both as an extra twist of the knife – and on their own
26 Jan 2022
Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular
Sticky notes on a monitor displaying assorted passwords
information security (InfoSec)

Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular

Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC
15 Dec 2021
Facebook for business: know the risks
Facebook for Business
facebook at work

Facebook for business: know the risks

The social media giant has some great features for businesses, but there are hazards too
16 Aug 2021
The truth about ransomware
An abstract image showing a person trying to connect to a computer which has a large padlock attached to it, as a ghost wearing a fedora floats menacingly out of it and demands money
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
The truth about ransomware
An abstract image showing a person trying to connect to a computer which has a large padlock attached to it, as a ghost wearing a fedora floats menacingly out of it and demands money
Security

The truth about ransomware

Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
Security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020
What is NoOps?
Cyber security automation mockup
DevOps

What is NoOps?

There are numerous approaches to in-house development; we explore one that focuses squarely on efficiency
4 Jul 2020
Why and how I enrolled in Google’s Advanced Protection Program
cloud security

Why and how I enrolled in Google’s Advanced Protection Program

Physical security keys are at the heart of the company’s efforts to protect high-profile targets
28 Apr 2020
Remote support is a fact of life…
remote access monitoring
remote access

Remote support is a fact of life…

Now you need to deal with the security risk
11 Apr 2020
Does your business need its own VPN?
VPN log in screen displayed on a computer screen
virtual private network (VPN)

Does your business need its own VPN?

You might assume that a company VPN is overkill for small businesses, but it's increasingly a necessity for most businesses
23 Mar 2020
If not passwords then what?
A close-up shot of a login portal
cyber security

If not passwords then what?

Google and Microsoft have both talked up a passwordless future, but what does that mean and is the technology ready to make it happen anytime soon?
8 Jan 2020
Compromising email accounts is easier than you might imagine
Security

Compromising email accounts is easier than you might imagine

Why you should take steps to protect your business from zombie phishing attacks
11 Aug 2019
The A-Z of security threats 2018
A digital padlock representing security
Security

The A-Z of security threats 2018

Industry experts give their thoughts on the growing range of threats facing modern businesses
3 Oct 2018
What is a cyber kill chain?
Graphic of a cyber criminal or hacker
cyber attacks

What is a cyber kill chain?

How understanding the progression of an online attack can help you defend your business
13 Jul 2018
Social engineering: your business' biggest security risk
Padlock being lifted by a fishing hook on a blue background to symbolise phishing attacks
social engineering

Social engineering: your business' biggest security risk

It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
Move over VMs, the future of app deployment is in containers
Crane lifting shipping container, surrounded by lots of shipping containers
virtualisation

Move over VMs, the future of app deployment is in containers

A look at a more flexible and efficient way to isolate and modularise your apps
10 Apr 2018
Secure your Wi-Fi against hackers in 10 steps
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
5 Feb 2018
How to build web traffic without turning to the dark side
Network & Internet

How to build web traffic without turning to the dark side

You can buy links and likes, but they won’t do you any favours in the long-run
3 Nov 2017
How to protect against cyber threats
Locks on a screen with one open and in red
Security

How to protect against cyber threats

IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
Brace yourself for Brexit
The Union Jack layered under half a torn EU flag.
public sector

Brace yourself for Brexit

Leaving the EU is supposed to give British businesses a boost, but it might not be as simple as that
30 May 2017
Why SMBs need a good disaster recovery plan in place
Graphic of a user engaging in a ransomware exchange
Security

Why SMBs need a good disaster recovery plan in place

Work in a small business? Then you’re a target for ransomware
14 May 2017
Why UK government must get strategic about cybersecurity
Open padlock on circuit board
Security

Why UK government must get strategic about cybersecurity

Government investment in cybersecurity is great, but what matters is where the money goes
22 Feb 2017
How to carry out workplace email surveillance
email symbols over a man's hands
Security

How to carry out workplace email surveillance

Want to monitor employee communications? Davey Winder explains your rights and obligations
19 Sep 2016
Five security threats Windows 10 protects you against
Security

Five security threats Windows 10 protects you against

Love it or hate it, Windows 10 is a pretty secure OS
9 Aug 2016