Blog

These posts will explore trends in Cybersecurity, offering practical tips and strategies to help you make better decisions for your organisation:

  • Computer Command Line Interface

    Keywords, keywords, keywords!

    3 min

    Keyword searching has been used as a way to locate evidence from the very beginning of what ...

  • Trojan horse program (malware)

    2 min

    A medical research laboratory was alerted by anti-virus software to the presence of a Trojan horse program ...

  • Everything you need to know about GDPR

    3 min

    What is GDPR? On the 25th May 2018 the European Union’s General Data Protection Regulation (GDPR) will ...