Are you sharing photos and files safely?

Are you sharing photos and files safely?

At CIT it feels like someone is getting married or having a baby every other week and we love to see the pictures, but… is it safe? When storing and sharing photos it’s important to use a trusted and safe website or software, otherwise you could find yourself in...
The To-Do List: Once a Team Member has left

The To-Do List: Once a Team Member has left

When a team member moves on and a new person replaces them, we know it can be a hectic and busy period. Whilst you’re showing the new starter the ropes and planning the leaving drinks for your cherished team member, it’s easy to forget to remove their access to...
Attacker Advice: How do I spot a Phishing Email?

Attacker Advice: How do I spot a Phishing Email?

A Phishing attack is a type of Social Engineering, which has the aim to trick an individual into clicking on links and sharing sensitive information through email. Cyber criminals have become extremely sophisticated and they can often believably take on the appearance...