<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1601576979905566&amp;ev=PageView&amp;noscript=1">

Secure with celerity 07.05.2020

In this week's episode of Secure with Celerity  we were joined by Celerity Technical Atchitect - Cyber Security, Steve Laidler and  Lead Cyber Security Analyst, Josh Read.

Read More

Tags: Cyber Threats, Security, Cyber Security, Data Breach, Cyber News, Data Protection

Posted by David Taylor on 10-May-2020 17:10:11

COVID-19 Public Sector Services Available On Crown Commercial Service

Read More

Tags: Cyber Security, Crown Commercial Services, Data Protection, backup solution, Phishing, Vulnerability Management-as-a-Service, service desk

Posted by Tracy Ridgley on 22-Apr-2020 14:05:11

Benefits of Outsourcing Your  Vulnerability Management

Read More

Tags: Cyber Security, vulnerability management, VMaaS, Vulnerability Management-as-a-Service, network security

Posted by Chris Roche, CEO on 28-Feb-2020 13:41:57

Adopting A Layered Approach To Phishing

In 2019, cyber criminals are finding smarter and more integrated ways to target companies and individuals.

Read More

Tags: Cyber Threats, Cyber Security, Cyber-Attacks, Phishing, layered approach to security

Posted by Steven Laidler on 30-Oct-2019 17:20:51

A guide to spotting a phishing email

Phishing is a major security threat for modern businesses. Knowledge of what is, and isn’t a phishing email varies, with many employees at risk of falling foul to malicious emails.

Read More

Tags: Cyber Threats, Cyber Security, Cyber-Attacks, Phishing

Posted by David Taylor on 24-Oct-2019 15:15:00

Posts by Tag

See all