LinkedIn "Social Engineering": Protecting Your Staff from Fake Recruitment Scams

LinkedIn "Social Engineering": Protecting Your Staff from Fake Recruitment Scams

LinkedIn "Social Engineering": Protecting Your Staff from Fake Recruitment ScamsNathan Colyer-Long
Published on: 11/05/2026

A fake recruiter message is one of the cleanest social engineering tricks around because it doesn’t look like a trick. That’s why LinkedIn recruitment scams work so well inside real businesses.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning
TITLE:  The "Legacy Debt" Audit: Identifying the  3 Oldest Risks in Your Server Room

TITLE: The "Legacy Debt" Audit: Identifying the 3 Oldest Risks in Your Server Room

TITLE:  The "Legacy Debt" Audit: Identifying the  3 Oldest Risks in Your Server RoomNathan Colyer-Long
Published on: 08/05/2026

The most dangerous thing in a server room is often the phrase, “Don’t touch that.”

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning
The "Session Cookie" Hijack:  Why MFA Can’t Always Save You

The "Session Cookie" Hijack: Why MFA Can’t Always Save You

The "Session Cookie" Hijack:  Why MFA Can’t Always Save YouNathan Colyer-Long
Published on: 03/05/2026

MFA is a strong front-door lock. But it’s not the only thing that decides whether someone can get in.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning
Stop Ransomware in Its Tracks:  A 5-Step Proactive Defense Plan

Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan

Stop Ransomware in Its Tracks:  A 5-Step Proactive Defense PlanNathan Colyer-Long
Published on: 27/04/2026

Ransomware isn’t a jump scare. It’s a slow build.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning