Home / Blog
Written for founders, ops leads, and the person who ends up owning Google Workspace by default. Plain English, real consequences, and no filler.
High
Business email compromise
Spoofed invoices and payment redirection. The most financially damaging attack on UK SMBs right now.
Read the article →
Elevated
Orphaned accounts after leavers
Most common access control finding. Ex-employees often retain live credentials weeks after leaving.
Read the article →
Ongoing
DMARC on quarantine, not reject
The most common audit finding. Quarantine still allows spoofing. Only reject stops it.
Read the article →
Neither platform is universally better. But the choice matters more than most people realise — especially from a security standpoint. An honest comparison, not a marketing deck.
Read the article →Prices range from £30 to £120+ per user per month. A plain-English breakdown of what drives the cost, what's included at each level, and how to compare quotes accurately.
Read the article →Most businesses don't know there's a problem until something goes wrong. These five signs suggest your Workspace hasn't been properly reviewed — and what the consequences look like.
Read the article →A full breakdown of the 20 controls in a professional audit — identity, email authentication, data sharing, and endpoint security. What each one covers and why it matters.
Read the article →Google protects its infrastructure. Your data is a different matter. Here's what Google actually covers, where the gaps are, and what independent backup does that built-in tools don't.
Read the article →Antivirus catches known malware. Endpoint detection and response catches what antivirus misses — and contains it before it spreads. Here's the difference, and why it matters for small teams.
Read the article →Most IT support contracts are vague about scope. Here's a plain-English breakdown of what managed IT for a remote-first business should cover — and what red flags to watch for.
Read the article →Most small businesses do not have a plan for the first hour of a breach. Here is what that hour should look like — and what it usually looks like when nobody is watching.
Read the article →Right now, anyone could be sending emails that look exactly like they came from your domain. DMARC is what stops that. Here is how to set it up properly.
Read the article →Modern phishing is targeted and convincing. Here's what the warning signs actually look like now, and the exact response steps when a click happens.
Read the article →Your Workspace probably has at least three of these gaps. The free audit finds them in 45 minutes — written report, no obligation, no cost.
The UK government-backed certification covering the five controls that prevent most attacks. What it covers, who needs it, and whether it's worth £300 of your time.
Read the article →Most businesses handle Workspace offboarding badly. Here's what actually needs to happen on a leaver's last day — and the steps most businesses skip entirely.
Read the article →Most small businesses are one bad password away from a serious problem. Here's how to find out where you stand, and the three things to fix first.
Read the article →Five checks, ten minutes, Super Admin access. Here's a practical self-audit that tells you whether the most critical controls are in place — no IT background required.
Read the article →Permissions accumulate silently over time — everyone becomes a Manager, contractors never get removed. Here's how to audit and fix your Drive access in under an hour.
Read the article →Most new user setups take 5 minutes and miss 3 security steps. Here's the complete process — account, groups, Drive access, MFA, device — done right from day one.
Read the article →BEC is the most financially damaging cyber threat facing UK small businesses right now. Here's how it works, why remote companies are the easiest targets, and what actually stops it.
Read the article →MFA eliminates the vast majority of account takeover attacks. It takes 20 minutes to enforce properly. Here's the step-by-step guide — available versus enforced, and why that difference matters.
Read the article →Google's defaults are built for convenience, not security. Most organisations set up their Workspace once and never go back. Here are the eight settings that matter most.
Read the article →Find out where yours stands. 45 minutes, 20 controls reviewed, written report. The report is yours to keep.