Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
Warning Issued Over Fake Bank and HMRC Letters
Identity & Access Management Warning Issued Over Fake Bank and HMRC Letters

Today we're joined by Rupert Marais, our in-house Security Specialist, whose expertise in cybersecurity and device security gives him a unique perspective on how modern fraud operates. We’ll be exploring the surprising resurgence of old-school postal scams, delving into the sophisticated

Attackers Weaponize Zoom Display Names for Phishing
Malware & Threats Attackers Weaponize Zoom Display Names for Phishing

A security notification arrives from a trusted source like Zoom, carrying a message so urgent it bypasses your usual skepticism—but the real danger is cleverly embedded within the sender's name itself. This scenario is not hypothetical; it represents a sophisticated new frontier in phishing where

Trump's Software Security Rollback Divides Experts
Data Protection & Privacy Trump's Software Security Rollback Divides Experts

A recent directive from the Trump administration's Office of Management and Budget has dramatically altered the landscape of federal software procurement, rescinding a landmark policy that mandated stringent security documentation from government software suppliers. The move, outlined in memorandum

Palo Alto's High Valuation Clouds Its Strong Outlook
Infrastructure & Network Security Palo Alto's High Valuation Clouds Its Strong Outlook

In the high-stakes world of cybersecurity, a company's strategic dominance often seems like a clear signal for investment, yet the financial markets frequently tell a more complicated story. Palo Alto Networks finds itself at this very crossroads, where its commanding position as a market leader is

Does Poor Data Security Erode Customer Trust?
Security Operations & Management Does Poor Data Security Erode Customer Trust?

In the intricate fabric of the modern digital marketplace, where every transaction and interaction is woven with threads of personal data, the relationship between businesses and their customers has become increasingly defined by a new, non-negotiable currency: trust. The implications of a single

n8n Security Vulnerabilities – Review
Infrastructure & Network Security n8n Security Vulnerabilities – Review

The rapid adoption of low-code workflow automation tools has empowered countless organizations, yet the very flexibility that makes these platforms so powerful also introduces complex security challenges that can go unnoticed until it is too late. This review explores two recently discovered

Flawed Sicarii Ransomware Can't Be Decrypted
Endpoint & Device Security Flawed Sicarii Ransomware Can't Be Decrypted

In the ever-evolving landscape of cyber threats, a new ransomware strain named Sicarii has emerged, not for its sophistication, but for its catastrophic incompetence. To unpack the bizarre nature of this malware, we sat down with Rupert Marais, our in-house security specialist. With deep expertise

What Is WhatsApp's New Lockdown Security Mode?
Endpoint & Device Security What Is WhatsApp's New Lockdown Security Mode?

Introduction In an increasingly connected world where personal data is constantly under threat, the security of our private conversations has never been more critical for those whose work or profile places them at a higher risk of surveillance. As digital threats evolve in sophistication, so too

Is Russia's Cyber War on NATO's Grid Failing?
Infrastructure & Network Security Is Russia's Cyber War on NATO's Grid Failing?

As the winter chill settled over Poland late last year, a far more menacing threat was silently unfolding in the digital realm, targeting the very infrastructure designed to keep the nation warm and powered. On December 29 and 30, 2025, a sophisticated cyberattack aimed to cripple two major

Is SharePoint the New Frontier for Phishers?
Infrastructure & Network Security Is SharePoint the New Frontier for Phishers?

The very digital collaboration tools designed to foster productivity and seamless information sharing are increasingly being weaponized by sophisticated threat actors, turning trusted platforms into Trojan horses for widespread cyberattacks. A recent, highly-coordinated campaign has brought this

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later