Skip to content

Blogs & Articles

Read the latest blogs and articles on the topics of cybersecurity and online safety. Discover valuable advice and expert insights, all in one place.

A diverse group of individuals proudly displaying a large green check mark, symbolizing approval and success.
Two images with one displaying a woman constantly warning people while the other shows a woman who has captured a suspicious man Proactive vs reactive cybersecurity: Why you need to know the difference October 23 2024 Blog From online banking, shopping and social media to video calls with grandchildren, the internet is an integral part of our daily lives. Our homes are becoming smarter with Internet of… Read More
Two contrasting images showcasing various types of security measures, highlighting their distinct features and applications. Endpoint protection and antivirus: What’s the difference? October 2 2024 Blog Remember when we first started using computers and smartphones? The excitement of notification pings, customising our Myspace page and fearlessly clicking on flashing banners, certain we’d won an amazing prize.… Read More
A laptop and a smartphone, each adorned with a green Sapher Shield icon, representing digital security and safety. Understanding Endpoint Detection and Response (EDR) October 2 2024 Blog Laptops and smartphones have become extensions of ourselves, always within reach. With this constant connection comes the need for constant protection, so if you’re not already, it’s time to prioritise… Read More
A password protected sauce being poured into a bowl The secret sauce of software: Understanding business rules and algorithms August 30 2024 Blog We know algorithms are a part of how technology works, but what exactly are they? You could compare it to the step-by-step instructions of a recipe that tell computers how… Read More
A man grasping a mobile phone featuring a padlock icon, symbolizing the importance of safeguarding personal information. Encryption Explained: Why it matters for everyday internet users August 30 2024 Blog Our methods of protecting information delivery and verifying a sender’s identity have truly evolved from wax sealed documents and registered post with our digital age. Encryption has become a necessity… Read More
Footprint that displays digital logins and email Digital Footprints: The information we leave online and how to manage it August 30 2024 Blog Every time we use the internet, we leave behind digital footprints of our activities, much like dropping a breadcrumb trail to find our way back in the forest. From social… Read More
Back To Top