CyberFunded Cyber Support Log4j Global threat image

What Is Log4j and what can we do about it?

The Log4j vulnerability The “Log4j Vulnerability” has become a widespread concern practically overnight, raising questions and fears for anyone that owns a computer.  Global uncertainty about the vulnerability has sent business owners into a panic and has experts in the field scrambling for answers.   Let us take some time to look at what we know about the vulnerability, what…

Read article
ResearchCyberEconomyICASMicrosoft Road point arrow to cloud with signpost to success

6 Steps to Boost your IT Strategy for Accountants

Many longer-term plans for your IT have been fast-tracked over the past 16 months. As more organisations start to return to the office, business owners face many decisions about their IT strategy moving forward. Typically, many accountancy firm’s technology choices have been driven by the products they’ve chosen over the years, perhaps by the relationship…

Read article
CyberServices

The world has changed – has your cyber security? Introducing Endpoint Detection and Response (EDR)

Why Anti-virus isn’t enough Security used to be easy. You installed antivirus (AV) solutions, trained employees not to click on unknown links, and kept software and websites up to date. In the modern world, cyber threats morph and multiply daily. Unfortunately, traditional antivirus programs that operate on signatures cannot adequately defend against some of the…

Read article