Davey Winder
The truth about ransomware

Security
The truth about ransomware
Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
The truth about ransomware

Security
The truth about ransomware
Data-stealing malware can bring the biggest business to its knees – but what is the real ransomware risk, and how do you safeguard against it?
9 Feb 2021
Secure your Wi-Fi against hackers in 10 steps

Security
Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Secure your Wi-Fi against hackers in 10 steps

network security
Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020
What is NoOps?

DevOps
What is NoOps?
There are numerous approaches to in-house development; we explore one that focuses squarely on efficiency
4 Jul 2020
Why and how I enrolled in Google’s Advanced Protection Program

cloud security
Why and how I enrolled in Google’s Advanced Protection Program
Physical security keys are at the heart of the company’s efforts to protect high-profile targets
28 Apr 2020
Remote support is a fact of life… 

remote access
Remote support is a fact of life…
Now you need to deal with the security risk
11 Apr 2020
Does your business need its own VPN?

virtual private network (VPN)
Does your business need its own VPN?
You might assume that a company VPN is overkill for small businesses, but it's increasingly a necessity for most businesses
23 Mar 2020
If not passwords then what?

cyber security
If not passwords then what?
Google and Microsoft have both talked up a passwordless future, but what does that mean and is the technology ready to make it happen anytime soon?
8 Jan 2020
Compromising email accounts is easier than you might imagine

Security
Compromising email accounts is easier than you might imagine
Why you should take steps to protect your business from zombie phishing attacks
11 Aug 2019
The A-Z of security threats 2018

Security
The A-Z of security threats 2018
Industry experts give their thoughts on the growing range of threats facing modern businesses
3 Oct 2018
What is a cyber kill chain?

cyber attacks
What is a cyber kill chain?
How understanding the progression of an online attack can help you defend your business
13 Jul 2018
Social engineering: your business' biggest security risk

social engineering
Social engineering: your business' biggest security risk
It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
Move over VMs, the future of app deployment is in containers

virtualisation
Move over VMs, the future of app deployment is in containers
A look at a more flexible and efficient way to isolate and modularise your apps
10 Apr 2018
Secure your Wi-Fi against hackers in 10 steps

network security
Secure your Wi-Fi against hackers in 10 steps
Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
5 Feb 2018
How to build web traffic without turning to the dark side

Network & Internet
How to build web traffic without turning to the dark side
You can buy links and likes, but they won’t do you any favours in the long-run
3 Nov 2017
How to protect against cyber threats

Security
How to protect against cyber threats
IT Pro looks at the four biggest enterprise cyber threats and how to protect against them...
8 Jun 2017
Brace yourself for Brexit

public sector
Brace yourself for Brexit
Leaving the EU is supposed to give British businesses a boost, but it might not be as simple as that
30 May 2017
Why SMBs need a good disaster recovery plan in place

Security
Why SMBs need a good disaster recovery plan in place
Work in a small business? Then you’re a target for ransomware
14 May 2017
Why UK government must get strategic about cybersecurity

Security
Why UK government must get strategic about cybersecurity
Government investment in cybersecurity is great, but what matters is where the money goes
22 Feb 2017
How to carry out workplace email surveillance 

Security
How to carry out workplace email surveillance
Want to monitor employee communications? Davey Winder explains your rights and obligations
19 Sep 2016
Five security threats Windows 10 protects you against

Security
Five security threats Windows 10 protects you against
Love it or hate it, Windows 10 is a pretty secure OS
9 Aug 2016
Four cheap dark web cyber threats

hacking
Four cheap dark web cyber threats
Hackers are turning to the dark web for cheap exploits - here's how to protect your business
29 Jun 2016
Five weirdest password alternatives of all time

Security
Five weirdest password alternatives of all time
Computers can identify you based on your butt and your walk, not to mention your smell...
14 Jun 2016
Privacy is the collateral damage in our war on terror

Security
Privacy is the collateral damage in our war on terror
More UK citizens must value privacy for government to leave our data alone
23 May 2016
Ethical hackers are finally getting their rewards

hacking
Ethical hackers are finally getting their rewards
For too long, the unsung heroes of cybersecurity have been undervalued
3 May 2016
Why a nation state isn't behind the Panama Papers hack

hacking
Why a nation state isn't behind the Panama Papers hack
Mossack Fonseca had its data stolen via an embarrassingly easy security flaw
11 Apr 2016
Encryption is a touchy subject for the Home Office

Security
Encryption is a touchy subject for the Home Office
Theresa May's Modern Crime Prevention Strategy: strong on rhetoric, light on security measures
24 Mar 2016
Budget 2016: What about cybersecurity spending?

Opinion
Budget 2016: What about cybersecurity spending?
George Osborne's failure to explain how cyber budget will be spent was a missed opportunity
16 Mar 2016
Why Macs are no more secure than the rest of them

malware
Why Macs are no more secure than the rest of them
Mac users are fiercely defending their platform's security after KeRanger, but they're wrong to
11 Mar 2016
RSA 2016: FBI and NSA line up next to security vendors 

Security
RSA 2016: FBI and NSA line up next to security vendors
The Apple-FBI encryption battle rightly dominates discussion at security conference
3 Mar 2016
Would a Brexit weaken data privacy in the UK?

public sector
Would a Brexit weaken data privacy in the UK?
Data privacy should be a central issue in debate of EU referendum pros and cons
26 Feb 2016
FBI wants a legal backdoor from Apple, not a technical one

Security
FBI wants a legal backdoor from Apple, not a technical one
Is the FBI's court ruling about more than getting into San Bernardino killer's iPhone?
17 Feb 2016
Safer Internet Day could teach businesses a thing or two

Security
Safer Internet Day could teach businesses a thing or two
Safer Internet Day 2016 promotes better web security for families - but corporations should listen up as well
9 Feb 2016
Why Privacy Shield will fail to protect our data

data protection
Why Privacy Shield will fail to protect our data
Safe Harbour’s replacement is based entirely on trust - what a big mistake
8 Feb 2016