Skip to content

Cyber Attack

TSCM – What is it & why it’s more important than ever before…

Picture this: you're in your boardroom, discussing confidential matters with your team, unaware that a hidden camera...

Tales from the Trenches

Andrew recently joined Toro as a Senior Security Consultant. With hundreds of pen tests under his belt, we interviewed...

Facebook Marketplace – The latest frontier for cyber criminals

Facebook marketplace was introduced back in October 2016, and it changed the landscape on purchasing not only...

10 Questions every Small Business should be asking about Cyber Security...

Cyber security should no longer be considered just a technical concern, it needs to be seen as a pivotal business...

Risks facing Businesses in 2024

As January 2024 unfolds, the security and risk community finds itself grappling with a pivotal question: What lies...

Phishing, Quishing, Smishing, and Vishing

Phishing, Quishing, Smishing, and Vishing – What do they mean and how can you protect yourself

Cyber Security Awareness Month: 8 Cyber Security Safeguarding Tips

In honour of Cyber Awareness Month, our team of security experts has come together to share with you their top tips to...

UK Government’s ‘Revolutionary’ Emergency Alert System, Explained

As global crises continue to converge, the British Government is changing its emergency mass notification system to...

What could a real Undeclared War cyber attack look like?

The Undeclared War is new drama series about a widespread hack on the UK’s computer networks. Here’s what experts say...