Skip to content
Logically Secure Ltd
Menu
  • Testing Services
  • Incident Response
  • Consulting
  • Blog
  • About Us
    • Careers
    • Contact Us
    • Data Handling

Month: December 2020

Cyber attack image
Article / Cyber security / Information Security / Security / Software Security

11 Common Cyber-attack Methods

Although every cyber-attack is individual, the strategies and tactics overall are often very similar and fall into a number of methods. Cyber criminals draw upon common types of hacking techniques …

Cyber security key words
Article / Cyber security / Incident Response / Information Security / Security / Software Security

10 fundamental steps of cyber security

The original ‘10 steps to cyber security’ were published in 2012 and are now used by a majority of the FTSE350. How do you protect your sensitive data and personal …

Article / Cyber security / Security

The Importance of Two-Factor Authentication (2FA)

With security breaches, digital crime and internet fraud continuously on the rise, the importance of safeguarding your information has never been greater. Many breaches are password related, and it’s not …

Recent Posts

  • 9 Basic Steps to help check an email isn’t Phishing
  • 5 key security factors to working from home more safely
  • 11 Common Cyber-attack Methods
  • 10 fundamental steps of cyber security
  • The Importance of Two-Factor Authentication (2FA)
Copyright © 2023 Logically Secure Ltd