Blog

Home Smart Assistants

Home Smart Assistants

Home Smart Devices Smart speakers (or voice-enabled assistants) can perform many different services, triggered by voice commands from the user including, but not limited to, playing music, providing weather and traffic updates and keeping notes. There are four main...

read more
What are CTFs?

What are CTFs?

What is a CTF?  CTF stands for Capture the Flag. In the Cyber Security world this relates to an event where the aim is to hack into systems and find flags to earn points, pride or bragging rights. The flags can be hidden in a multitude of different places...

read more
Zoom Meetings Security

Zoom Meetings Security

By now most people will have used or at least heard of Zoom and subsequently some of the privacy and security issues that have been brought up surrounding the service. This means we need to configure the software to help avoid some issues and Zoom...

read more
COVID-19/Coronavirus Phishing Attacks

COVID-19/Coronavirus Phishing Attacks

The spread of Coronavirus has now made it an increasingly common topic which criminals are attempting to exploit for their own gain.These attacks are usually repackaged and reimagined versions of pre-existing ones. Spam messages are using news sources as a...

read more
When Ransomware Strikes

When Ransomware Strikes

Redcar and Cleveland Council were attacked with ransomware on Saturday, February 8th. The council website is still not fully operational today, and this is only one of the consequences of the attack. Staff had to resort to pen and paper, and press reports...

read more
Setting up two-factor authentication (2FA)

Setting up two-factor authentication (2FA)

How setting up 2FA can help protect your online accounts, even if your password is stolen.This guidance explains how you can set up two-factor authentication (2FA) on your important online accounts. Doing this makes it harder for criminals to access your...

read more
10 Steps: Home and Mobile Working

10 Steps: Home and Mobile Working

Summary Mobile working and remote system access offers great business benefits but exposes new risks that need to be managed. You should establish risk based policies and procedures that support mobile working or remote access to systems that...

read more
Six simple steps to avoid being hacked

Six simple steps to avoid being hacked

With the increasing number of hacks affecting individuals and organisations, we have come up with our six top tips on how to avoid being a victim of a hack. Suspicious of emails Many cyber attacks are founded through email campaigns containing...

read more

CONTACT US

Registered office and postal address
Whiteleaf Business Centre,
11 Little Balmer,
Buckingham,
United Kingdom,
MK18 1TF

+44 (0)20 3441 7642
info@sikercyber.com

FOLLOW US

We have a regional office located in: Edinburgh, UK

Siker Ltd is registered in England & Wales
Company Registration Number No. 11208267

From Middle English meaning Secure, Safe, Stable.
From Old English meaning Secure from, Safe, Free from danger or harm.

Believe - Learn - Achieve