https://www.linkedin.com/company/project-five https://www.youtube.com/channel/UCjVp0ZZj0ViVhTmvucqp_7A https://www.instagram.com/projectfiveit/
need IT support? Let's talk…
For existing customers, please call
For new enquiries, please call

c/o Login Business Lounge
34 Park Street
Camberley
GU15 3PL

x close

Mercedes Oliveira

graphic designer

x close
Tag : Cyber Security
How EDR can help protect your business
February 5, 2024

Endpoint Detection and Response (EDR) is a security technology that provides businesses with an additional layer of protection beyond what Endpoint Protection (EP) can offer.

continue reading >
The Impacts of Rising Cybercrime
September 7, 2023

The impacts of Cybercrime can be devastating to a business of any size. Here are some of the key impacts, and how you should be approaching your Cyber Security

continue reading >
Why Traditional Antivirus is a thing of the past
September 5, 2022

We all know that cyberattacks are becoming more and more sophisticated – which means traditoinal antivirus alone isn’t going to keep you safe. Here’s what you can do…

continue reading >
Critical Log4j Vulnerability
December 14, 2021

Important information about the new, highly dangerous vulnerability on your computer known as ‘Log4j’…

continue reading >
Are your people leaving the door unlocked? An infographic
March 2, 2020

Did you know that the biggest threat to your cyber security is your own team?

continue reading >
Two Factor Authentication: an infographic
November 22, 2019

Two Factor Authentication (2FA): an infographic. 2FA means that you’re only granted access to your PC or account once you have given two pieces of evidence. It is an extra level of security for your business.

continue reading >
High Confidence Phishing Email
November 27, 2019

Microsoft are introducing High Confidence Phishing Email to the spam filter policy. Find out what this means for you.

watch now >
Two Factor Authentication
November 22, 2019

Two Factor Authentication, or 2FA as it is often referred to, is a method in which you are only granted access to your PC or account once you have given two pieces of evidence. It acts as an extra security blanket for your organisation.

watch now >
The dangers of sharing data online
July 29, 2019

We live in a world where we share everything online.  We’re in a no-holds-barred era of social media, and we don’t care who knows it. But we should…

continue reading >
can't find what you're looking for?
submit a topic idea here :
what size is
your business?
what size is your business?