LP Networks Blog: Cybersecurity
![We’re launching our new User Security Awareness Training](/site/assets/files/1276/security-awareness-training.900x0.png)
We’re launching our new User Security Awareness Training
Any people hold a key to access your site or building? We’d hazard that you don’t just hand out access to anyone.
![Zoom security breach](/site/assets/files/1274/zoomsecurity2-1.900x0.png)
Zoom security breach
What we can learn from the Zoom security breach
![Cybersecurity; how much should you be spending?](/site/assets/files/1267/blog-image-cybersecurity.900x0.jpg)
Cybersecurity; how much should you be spending?
We always like to hear that businesses are taking cybersecurity seriously, so were very happy to read that cybersecurity spending appears to be on the up.
![How to spot a suspicious email.](/site/assets/files/1264/lp-suspicious-email-1.900x0.jpg)
How to spot a suspicious email.
Our team gathered together to identify some of the most common ways to spot an email that isn’t right.
![How can the dark web impact your business.](/site/assets/files/1259/blog.900x0.jpg)
How can the dark web impact your business.
In the murky depths of the internet lies the Dark Web. It’s so hidden, users have to use a specific encrypted browser (TOR) to access it and its name describes it perfectly, a secretive place full of negative activities.