As a business owner, finding the perfect small business phone system can be a game-changer. In this article, we'll walk you through the essential steps and considerations to help you...
Read MoreThe Flywheel Blog is a good place to learn about all things related to information technology, including industry general information for beginners and the technical story behind the news headlines.
Martyn's Law aims to ensure better protection against terrorism by implementing stronger security measures in busy public places. In this blog post, we will explore the importance of Martyn's Law...
Read MoreLearn about the requirements for Cyber Essentials and Cyber Essentials Plus certification and understand the difference between the two levels of certification. What is Cyber Essentials Certification? Cyber Essentials is...
Read MoreDid you know that just 3% of users are responsible for 92% of cyber security breaches? They fall prey to the “Phishermen” - the people carrying out email phishing attacks...
Read MoreA CCTV system has several essential parts: the cameras, the monitoring station, software to control the system, cables and a power supply, a recording device and data storage. Modern equipment...
Read MoreThe best zero trust security software provides huge cyber security benefits. We list and analyse the strengths and limitations of each of the leading providers. We also cover what you...
Read MoreIf you use Microsoft 365 for your home PC and need to make a choice about how to support your business, you may not be aware of the extras you...
Read MoreWhether you're dealing with corporate-owned or BYOD personal devices, Intune can help you enforce policies, protect your data, and ensure compliance with your security requirements. Microsoft Intune is a comprehensive...
Read MoreWe review Microsoft Publisher, compare it against alternatives and even summarise other reviews to give you the fullest range of opinions possible. The only review of this graphics package you...
Read MoreMicrosoft Azure Information Protection is a powerful tool that can help you protect your sensitive data and ensure its confidentiality. If you're looking for a way to protect your sensitive...
Read MoreAn investigation by cloud computing provider Akamai has found that up to 16% of organisations were actively under threat from "command-and-control" C2 servers that were associated with known botnets and...
Read MoreHelp to Grow, a new digital initiative from the UK government, gives small businesses free and heavily discounted CRM and accounting software, as well as expert guidance. We look at...
Read MoreLearn about the Cyber Essentials fee and the benefits of getting certified. Understand what is required to obtain Cyber Essentials certification and how it can translate into increased revenue and...
Read MoreLearn about IASME Cyber Essentials certification and how to get certified. Understand why the UK government encourages all organisations to get certified and how it can help secure your organisation....
Read MoreVaping in schools is a growing problem that poses significant safeguarding challenges. Learn about the issues and new ways to detect it. Vaping in schools in the UK has become...
Read MoreIs AI useful? Is AI safe? For the answer to be "Yes", AI jobs of the future will involve shaping Artificial Intelligence and guiding how we use it. Our AI...
Read MoreZero Trust security software is designed for organisations that need to secure remote access to sensitive data and applications. It’s right for some but overkill for others – we run...
Read MoreWhile many people are familiar with the basic features of Microsoft Teams, such as chat, video calls, and file sharing, there are many less-known features that can make a big...
Read MoreAccording to leading US security firm Proofpoint, Chinese hackers constructed a phoney news website to steal information from Australian government officials, journalists, and others. We look more closely at this...
Read MoreMillions of WordPress websites get infected with malware every year, spreading spam and aiding fraud while the site owners are often oblivious. In this post, we cover the seven main...
Read MoreIn this post, we take a close look at international teenage cyber-crime gang, Lapsus$. We dissect how these pimply evil geniuses stole millions through ransomware, extortion and cryptocurrency fraud whilst...
Read MoreFlywheel is interested to see Scarborough in North Yorkshire is set to become a "national centre of excellence" in cyber security in 2023. The purpose of this government initiative is...
Read MoreLow-code development platforms dispense with old-fashioned code writing and instead use visual drag-and-drop modellers, smart services and components, and pre-built connectors. We look at what they are, the reasons for...
Read MoreWe outline the work of the Information Commissioner's Office (ICO) and how it can be a helpful source of compliance information and assistance to businesses. The Information Commissioner's Office is...
Read MoreWe explain some of the most commonly reported methods of spoofing, and how to avoid falling prey to them. What is spoofing? Your phone rings. A recorded, robotic voice with...
Read MoreThe possibility of AI-based email phishing attacks is on the horizon. There has never been a more critical time to examine what else you could be doing to improve your...
Read MoreYour marketing campaign email was planned to the last word, the embedded images were inspiring… and it ended up in everyone’s spam filters. This article explains how to avoid email...
Read MoreGot a favourite website, or one you need for work every day? That's your "watering hole". In watering hole attacks, cyber criminals set a trap on the website to infect...
Read MoreBeen refused a loan? Sudden flurry of junk mail or spam? Many people don't realise when they've fallen victim to identity theft. We examine how to recognise the signs of...
Read MoreThe right business laptop can make you work faster, feel happier and possibly even become a better person. If your work laptop is turning you into "that colleague" and it's...
Read More