Read more from Donald Ross

The Fortinet FSSO collector and DC agent can be incredibly valuable tools. Throughout this blog, we’re going to give you the key points in configuring and how to install Fortinet FSSO and DC agent here.
As cyber-attacks become more sophisticated, the security framework of Zero Trust should be at the forefront of everyone’s mind, especially when protecting sensitive data.
Many organisations are still relying on legacy software which can have a major impact on cyber security and can affect the performance and productivity of an infrastructure which can result in significant cyber risks. So, what are the issues an organisation can face with outdated legacy software?
Within the past few weeks, there have been several high-profile data breaches that have originated from Ransomware attacks. This blog will explore these recent attacks and offer practical tips on how you protect your organisation from Ransomware threats.
As technology continues to develop, unfortunately so do vulnerabilities. As a result, the Council of the European Union (EU) has introduced the NIS 2 Directive, an updated framework to enhance cybersecurity resilience in critical sectors such as healthcare and banking. This blog will provide an overview of the NIS 2 Directive, its implications, and the steps you should take to achieve compliance and enhance your business's security posture.

With Christmas just around the corner, online deals and flash sales will start to appear at a rapid rate, especially on Black Friday. During last year’s Black Friday sales the UK accounted for over 10 percent of all Global Black Friday searches online. It will come as no surprise, that this can be a breeding […]

What is a keylogger/keystroke logger? Keyloggers, otherwise known as Keystroke loggers, are becoming increasingly popular with cybercriminals. As a form of spyware, keyloggers can monitor keys pressed on a keyboard either through a software program or hardware device used to gain access to sensitive and private information and can even capture your screen. The data […]

Our very own resident Fortinet expert, John Myers, has recently developed some highly effective solutions for clients using both explicit and transparent proxies on Fortinet’s FortiGate firewalls. Rather than tell you more about it here, you can watch John explain in his own words how to control your users access to the internet and report […]

The world of cyber security never sleeps and so to ensure we stay on the front foot, we always always aim to be up to date with the latest software releases and the improvements they offer our clients. One of the most recent updates we wanted to bring to your attention is the release of […]