Ready to
get started?

Please feel free to give us a call on 0203 784 4460 or fill out the form below and we’ll get straight back to you.

March 2016

DMARC comes with its pros and cons. It’s not without reason that it’s been adopted by some of the biggest senders of email on the planet, including Google, Microsoft and Yahoo! According to reports by, prominent brands have managed to cut he potential for cyberattack by around 50%, through implementing the system. Not only does it allow users to see just who is trying to send unauthorised emails from their domains, but it also allows you to see whether your emails are being rejected by DomainKeys Identified Mail (DKIM) and the Sender Policy Framework (SPF). In addition, those who use DMARC tend to find that they have fewer problems with spam filters and junk-mail folders.Read More

In January of this year, Lincolnshire County Council was subject to a cyberattack, which resulted in all its IT systems having to be shut down for almost a week. The attack was believed to be a ‘zero-day attack’. This term refers to a vulnerability in the software that the vendor is unaware of. This hole is then exploited by hackers to either upload infiltrating malware, spyware or allow unauthorised access to user information. In this instance, the attack was used to deposit ransomware; a type of malicious software that encrypts data on infected devices and will only unscramble them, once a fee is paid. While the ransom of £350 was not met, it took IT staff “working 24/7” to restore the infected systems, while other staff “had been using pen and paper” in the interim.Read More

In February of this year, the Obama administration warned that America’s utilities companies could be the next target for cyber-criminals. In the wake of a sophisticated attack on three regional power companies in the Ukraine, which saw hundreds of thousands of people without electricity for over six hours, the US Government has told water suppliers, power companies and transportation networks to be on their guard. For many in the UK, stories such as these seem worlds away. However, according to research by Cyber Security Partners (CSP), the possibility that an attack of this type could be replicated against British utility companies is all too real.Read More

“Personal devices could also act as a “back door” to companies’ computer systems, while the data they gather bring another set of security challenges and might even put a user’s company at risk of attack.

Chris Underhill, head of information technology at consultants Cyber Security Partners, says that even something as seemingly simple as data gathered from a person’s fitness band could help outsiders to launch a cyber attack against the user’s company.Read More

CSP’s flagship product Zero, has blazed a trail in the world of anti-fraud email security by bringing real-time analytics and geo-location technology to help stop fraudulent email from ever being delivered. Zero utilises the DMARC open standard for authenticated email and leverages this technology to not only stop illegitimate email but to also identify how cyber-criminals operate, what data they are stealing from consumers and ultimately where they are.Read More