Close

Andy Currington

Social Engineering

Social Engineering  Download ‘Social Engineering’ as a PDF  When people think of a hacker, often they picture someone in a dark room with their hood up frantically typing on a keyboard, but often the most dangerous hackers are the ones who operate under everyone’s noses. Social Engineering, or human hacking, […]

Read More

Ransomware

Ransomware  Ransomware is a growing concern for many large business. We’ve all seen news stories where large business have been frozen out of their data because someone’s holding it hostage.  Download ‘Ransomware’ as a PDF What is it? Although there are different strains of ransomware they all work on the […]

Read More

Zoom vs. Teams vs. Meet: Which should I use?

Zoom vs. Teams vs. Meet: Which should I use? The three main frontrunners in the video conferencing arms race are Zoom, Microsoft Teams and Google Meet. You’d be forgiven for thinking “they’re all the same, right?” This is broadly true, and they share a lot of the same core functionality, […]

Read More

What is Digital Innovation Support?

What is Digital Innovation Support? The Lancashire Cyber Foundry (LCF) offers the opportunity for small to medium enterprises to explore the development of new digital products and services. The LCF Digital Innovation team provides a Research & Develop ment service, enabling practical investigation of innovative applications of technology within a […]

Read More

What is 5G? 

What is 5G?  Not only is 5G (fifth generation) a new faster network, but it has the potential to radically change the internet and the way we interact with it. Through its greater use of the radio spectrum it will enable more Internet of Things devices to access the internet […]

Read More

The battle of the e-signatures

The battle of the e-signatures The future of documentation is electronic signatures. During the last year, many companies have moved their wet ink signature processes to digital. This has created a huge market for electronic signature software, but which is best? This article takes three leading signature software products and […]

Read More

Returning to work

Returning to work At the time of writing this article (February 2021), businesses are starting to discuss what returning to work looks like. With cyber-attacks on SME’s up by nearly 40% since we started working from home, now is a great time for your business to consider cyber security for […]

Read More

Prototype vs. product

What is a prototype and where do I start? Prototyping is a huge part of any product design journey. It can be considered pre-emptive testing before lots of time, money and resource is used. However, prototyping isn’t just one thing. There are lots of different styles of prototyping. Although there […]

Read More

Post-COVID predictions

Post-COVID predictions For many people 2020 was one of the worse years in recent history however, it emphasised the importance of technology in the new age of working from home and limited in-person interaction. This article discusses some predictions for what will happen to technology and cyber security in the […]

Read More

Marketing cyber credentials

Marketing Cyber Credentials This article looks at the benefits of investing in cyber security, and how leading and embedding cyber security credentials within your marketing communications can, not only, help protect your business, but sell it too. Download ‘Marketing cyber credentials’ as a PDF Why you should celebrate cyber security […]

Read More