Fake Irish Revenue End of Year Email Scam

Microsoft Office 365, Azure locked out people who use its multifactor authentication

Topsec Alert: Have you been Pwned?

We are hiring: Technical Support Engineer (Dublin 12)

Topsec Awarded Place on G-Cloud 10 Framework Agreement

Infosec 2018

baseStriker: Massive security flaw in Office 365 lets hackers slip malicious links past its security.

IPEXPO 2018

Latest Office 365 outage hits UK users hard

CyberUK 2018

We are hiring: Sales Support Administrator (Dublin)

Serie A football club Lazio are the latest victim of a phishing attack

Will red weather warnings become a more regular occurrence?

Resilient Scotland Continuity Conference 2018

We are hiring: Technical Support Engineer (Dublin)

We are hiring: Senior System Administrator (Dublin)

Smarter Business Tech Live 2017

What is BadRabbit Ransomware?

Ophelia, you're breaking my heart…

Office 365 outage: UK and European users hit by service interruption

“Get Rich or Die Trying”: Lone Ranger Cyber Criminal responsible for over 4,000 attacks.

We are hiring: Technical Support (Dublin)

What is NotPetya Ransomware?

Infosec 2017

What is WannaCry Ransomware?

Google Docs users hit with sophisticated phishing attack which spread like wildfire.

Who is the most at risk of falling victim to phishing attacks, hacks and identity thefts? You might be very surprised.

Phishing Attack: Two large US technology companies scammed out of $100 million

CyberUK 2017

Microsoft Outage Impacts Office 365, Outlook, Skype and Hotmail Users.

Is my company too small to be hit by ransomware?

Does your Microsoft Exchange Environment have Mailbox Recipient Verification Switched on?

CEO Fraud and Whaling Attacks are on the Rise

Ransomware – Infect Two, Get Off Free.

Facebook Messenger – A Backdoor for Ransomware?

Office 365 Outage – Do you have a Plan B?

What is Doxware Ransomware?

With over 68 million Dropbox Credentials Compromised – Are Data Sharing Services Secure?

Topsec Awarded Place on G-Cloud 8 Framework Agreement

Another Microsoft Office 365 Outage Stops Businesses Sending and Receiving Emails

Microsoft Office 365 users hit by massive Cerber ransomware attack

EURO 2016 - Cybersecurity Threat

For Sale - LinkedIn Users' Login Credentials

Talk to Topsec at IP EXPO Manchester 2016 – Plus Get A FREE 1-to-1 Email Security Consultations

World Password Day 2016 - Tips For Creating Better Passwords

Phishing Alert: Department of Transport warns of email scam targeting motorists.

Avoiding Discrimination Cases – Why Content Filtering Matters So Much

Spam – Dealing With False Positives

Locky Shows Ransomware and Macro Viruses are Alive and Kicking

How To Introduce Personal Responsibility Into Your AUP

Simplifying email security for non-technical users

TalkTalk IT Security Breach – What Happened Next

Gone Phishing: How Businesses Avoid The Scams

Building a Security-First Corporate Mindset

Engaging Users in the Fight Against Cybercrime

How Much Does Spam Actually Cost Your Business?

Email monitoring – are you breaking the law?

Just How Important Are Email Disclaimers?

If You’re Not Using Email Encryption, Your Business is at Risk

The complete guide to spearphishing (and how to avoid becoming a victim)

Waste Cash or Boost Security – The Easiest Choice You’ll Make Today

How to get true Microsoft Office 365 x 365

Why Your Board Loves Reports (and it’s not the reason you think)

How IT Managers Avoid Mission-critical Email Server Outages

The One Mouse Click That Destroys Client Relationships & Ruins Businesses

McAfee Kills SaaS Email Protection – What Now For Customers?

How to Sell the Board on Email Security

Mobile devices – the highway to email security hell?

Macro Viruses Are Making a Comeback

Safe Harbour is Dead – What Now for European Businesses?

15 Year Old Hacker Breaches TalkTalk IT Security

Daily Mail Under Vicious Malvertising Attack

£20 Million Stolen From UK Financial Institutions Due to IT Security Breach

£40m Ransomware Gang Caught Red-Handed

Is Ransomware Becoming an IoT Security Threat?

DNS Mismanagement Almost Takes Down Google.com

Cloud File Exchange Vulnerabilities

Catastrophic Data Breach Leaks Telco Customers Confidential Info

Email Security Threats: IT Manager's Eyes Only [Slideshare]

Am I Safe From Mobile Malware?

5 Ways To Avoid Cyber Security Breaches in Businesses

5 Ways Protect the Cyber Security of Your Business

Beware of Phishing - Don't be caught hook, line and sinker

Flash Ads are Bringing about New Malware Dangers

Why is There an Increase in U.K. Security Breaches?

Cheating & Hacking: Ashely Madison Website Compromised

The Truth about the American OPM Security Breach

5 Ways to Secure Your Cloud Data

Your Password Can Be Hacked in 24 Hours

Android Users Fall Victim to Ransomware Involving the FBI & Porn

5 Ways to Avoid Malware Infection

Major Security Holes Found in Irish Businesses

Did the NSA Try to Get Berlin to Spy for Them?

Conservatives Aim to Reintroduce the Snoopers' Charter

NSA's Data Collection is Ruled Illegal, but Allowed to Continue

Is a Data Protection Agreement in the Works for the EU & US?

4 of Your Biggest Security Vulnerabilities

Mozilla Aims to Limit Access to Unencrypted Sites

Proposed U.S. Bill Could Extend NSA Surveillance Until 2020

Faulty Google Chrome Extension Raises Security Questions

AT&T Ordered to Pay $25 Million Due to Data Breach

HSBC Breach Compromises Financial Security of US Customers

4 Common Cyber Attacks You Should Look Out For

How Secure is My Data in the Cloud?

Ransomware: What It Is & How to Avoid It

Microsoft Changes Internet Explorer's "Do Not Track" Setting

How Can I Make Sure My Emails are Safe?

2 Web Browser Vulnerabilities You MUST Know

Keep Your Router Hacker-Proof with These Tips

4 Ways to Ensure a Safe BYOD Policy

What Is BadUSB? And Should I Be Scared?

Malvertising & Your Business: Are You Protected?

Is Your Company’s File Sharing Method Truly Secure?

Hackers Swindle up to $1 Billion from 100 Banks in 30 Countries

Why an IT Security Policy is Critical to Company Growth

What is the Patriot Act and how does it affect You?

Ensure ultimate password security with these 6 tips!

Four Things Your Employees Should Know about Phishing Scams

Recent BEC Scam Cheats Businesses out of Hundreds of Millions

The Public's Response to the Proposed Ban on Encryption

The Ultimate "Cheat Sheet" on Email Filtering

Where's the Balance Between Privacy and International Security?

2014 Study Reveals Huge IT Risks From Cloud Computing

ICANN Systems Compromised in Spear Phishing Attack

Hackers Embroil Snapchat in Sony Fallout

Why is email continuity critical for productivity in business?

Five Signs That Malware Has Infected Your Computer

Surprising Statistics About Computer Viruses

What Is The Real Impact Of Spam On Business?

What is email image analysis and why does your business need it?

Cryptolocker: deadly ransomware that can be prevented with Topsec Email Security

Microsoft to hand over email data

Phishing Mails

Major cybercrime security breach

Adobe Password Article Theft

Snowden & the Patriot Act.

Increase in Banking Phishing Scams

Businesses Targeted with UPS Phishing Scam

When the Seagulls follow the trawler…in the context of Phishing, email filtering and IT Security!

Do you Believe your Company is Vulnerable to External Cyber Threats?

The Dangers of Spam Emails for Business

New EU Cybercrime Directive

How Strong are your Business’s Passwords?

More Businesses Hit by “Targeted Attacks”

Business IT Security Tip – Don’t Install New Programs Without Consulting your IT Department

Types of IT Security Incidents That Took Place in Businesses in 2012 (Part 2)

The Threat From Spam Remains a Serious One

Types of IT Security Incidents That Took Place in Businesses in 2012 (Part 1)

Spam Volumes Decline - Threat Goes Up

What is the True Cost of an IT Security Breach for a Business?