Women wearing face mask on computer

5 Tips on Spotting Covid-19 Phishing Emails

As the pandemic continues, COVID-19 themed phishing emails are only becoming more prevalent. For cybercriminals, global, life-altering tragedies such as the coronavirus pandemic, merely provide more opportunity to exploit the public for personal gain. Currently, Google is blocking 18 million coronavirus scam emails every day for Gmail users alone. While large tech and cybersecurity companies are doing their best to …

Training educators during lock-down

Use Lockdown to Develop Your Team

While the majority of industries are suffering greatly during this period, schools continue to operate as best they can with the tools and resources they have. While other industries such as construction, continue to operate and move forward with their current projects. SO how can schools do the same, and use this time to keep their projects and strategies progressing? …

6 Things to Consider During Your Next Video Call

6 Things to Consider During Your Next Video Call

Video calls are not exactly the newest thing to grace the technology stage – in fact, Microsoft Teams has been doing it for well over 10 years. But they are quickly becoming our biggest lifeline for maintaining communication both in our personal and professional lives. Put simply.  The various video chat platforms around are not complicated to use, but it also doesn’t …

Coronavirus: updates, support and resources

Coronavirus: updates, support and resources

We will continue to update this blog with helpful updates, announcements, and resources as long as the coronavirus outbreak continues to impact schools and businesses. As the situation continues to evolve and the Government ramps up their measures to reduce the spread of coronavirus in London, we are doing what we can to continue to support our customers. We ourselves …

Understanding phishing for businesses

What is Phishing?

This blog covers what phishing is, why its is so effective, the stages of a phishing attack, how users can identify an attack and how to protect your businesses data from these attempts. Phishing summarised in 60 seconds Phishing is one of the most effective techniques used by hackers today to illegally obtain sensitive information from individuals and businesses. Phishing …

Anti-malware software Functions

What does Anti-malware software actually do?

How Anti-Malware Software Protects Your Business from Evolving Threats? As technology advances, integrating itself into almost every aspect of our lives- we become more accustom to providing personal and sensitive information to machines, websites, apps and emails when they request it. However, as technology evolves so do those out there trying to exploit it for there own personal gain. Therefore, …

Why should you back up cloud platforms?

Cloud platforms (Office 365 or Google G Suite) – Why Back Them Up?

Cloud platforms, the holy grail of data storage – or so many might think. While these platforms are a wonderful tool for storing and managing company data, they don’t provide foolproof data protection. Data stored in the cloud can still fall victim to malicious attacks, user error and accidental overwriting. It’s unlikely Microsoft or Google’s servers will entirely fail, but …

Game changing technology overview by Cygnet

Game Changing Technology

Cygnet’s CEO Darren King takes a look at what he calls ‘top technology’ with software and systems that can have a huge impact on your average day. “If I’m to reflect on some of the top technology currently available, you’d be forgiven for thinking it’ll include 360 degree cameras, SnapChat glasses or the latest drones. As exciting as a voice …