
The Small Business
Cyber Security Guy
Welcome to my personal blog — a space where I share my own views, opinions, and insights on technology, cyber security, and the realities of working in IT.
This blog is entirely personal. The thoughts and opinions expressed here are mine alone. They do not represent the views, policies, or positions of my employer, past or present, or any organisation I’m associated with professionally or personally.
Expect a mix of:
Straight-talking advice for small businesses
Honest takes on cyber security and IT trends
The occasional rant
A few war stories from the frontlines (names removed to protect the guilty)
With over 40 years in the industry, I’ve seen a lot — some of it brilliant, some of it baffling.
This blog is where I unpack all of it.

The Great Bargain of Cheap IT Support: A False Economy That’ll Cost You Dearly
Cheap IT support might seem like a bargain, but it’s a financial and security disaster waiting to happen. The majority of budget IT providers lack even basic externally audited cybersecurity certifications like Cyber Essentials Plus—which should be a minimum requirement. They cut corners on security, response times, and expertise, leaving businesses vulnerable to downtime, data breaches, and compliance fines. A proper MSP invests in real security, 24/7 monitoring, and incident response—and that costs at least £60 per user per month. Before you sign that ‘too good to be true’ IT contract, ask the hard questions, or risk learning the expensive way.

Cyber Essentials and Privileged Access Management: Just Enough or Just in Time?
Still letting employees run wild with admin rights? Cyber Essentials says NO MORE. The latest crackdown on privileged access means Just in Time (JIT) is OUT, Just Enough Access (JEA) is IN, and ThreatLocker is here to save your sanity. Ignore this at your own risk—hackers love lazy security!

Microsoft Accidentally Nukes Copilot – Because Of Course They Did
Just when you thought Microsoft couldn't top their Exchange meltdown, they go full send and accidentally delete their own AI assistant from Windows 11. No warning, no prompt—just poof. Gone. It's as if someone at Redmond duct-taped down the ‘F**k Around and Find Out’ button and walked away.
What’s next? Windows Update deciding Task Manager is ‘problematic’? Edge forcibly replacing all your passwords with ‘BingLovesYou123’? Buckle up—because this one’s a mess. Read on and prepare to rage.

WTF Happened to X? Is It Even Relevant Anymore?
Elon Musk took Twitter, rebranded it as X, and somehow made it an even bigger dumpster fire. Outages, bots, advertisers bailing—has X become the digital ghost town we all expected? Or is it just the billionaire’s latest expensive toy gone rogue? Let’s break down this glorious trainwreck

In-House IT vs. MSP: The Real Cost of IT Support for Businesses
Should your business handle IT in-house or outsource to a Managed Service Provider (MSP)? On paper, an in-house IT team might sound ideal—until you see the real costs. A single IT manager can set you back £80K+ a year, and that’s before factoring in security tools, compliance, and the inevitable sick days. Meanwhile, a properly managed MSP delivers 24/7 support, robust cybersecurity, and compliance-ready solutions—at a fraction of the price. If your IT plan is to rely on “Dave from accounts” to fix the Wi-Fi, good luck. The smarter choice? Investing in IT before disaster strikes.

Microsoft Exchange Online: How the Actual F*!# Do You Break Email for a Week?
For seven excruciating days, Microsoft completely broke email transport, crippling businesses worldwide. A botched update turned the simplest, most stable IT function into a flaming dumpster fire, leaving users helpless while Microsoft sat in silence for three days before admitting anything was wrong.
How do you screw up SMTP, MAPI, and basic email delivery in 2025? How does a trillion-dollar company make email less reliable than it was in the 1980s? And more importantly—why should you still trust Microsoft 365 after this catastrophic f*-up? Buckle up, we’re diving in!

Malicious Chrome Extensions Are Now Your Password Manager — And They’re Keeping Your Logins (For Themselves)
Security researchers have discovered malicious Chrome extensions that detect and impersonate popular password managers, tricking users into handing over master passwords. Learn how this attack works, why Chrome’s extension security is still a disaster, and what users and businesses should do to stay safe.

ChatGPT Operator Data Leak – Why Your AI Assistant Can’t Keep a Secret
ChatGPT Operator, the AI agent with browsing powers, can be hijacked via prompt injection, causing it to leak private data or obey hidden attacker commands. Learn how this exploit works, why AI assistants need serious supervision, and what businesses must do to avoid their AI leaking client data to the internet.

The StubHub Ticket Heist: When Cybercriminals Outsmarted the Entire Concert Industry with Basic URL Tricks
Two criminals stole £500k worth of Taylor Swift tickets using nothing more than stolen StubHub URLs. This basic security failure exposes a flaw in how digital tickets are secured — and it’s a lesson for every business that relies on magic links. Find out what went wrong and how to protect your own platform from the same fate.

Silk Typhoon Supply Chain Attack: How Crap MSPs Sell You Out for £20 a Month
If your MSP isn’t certified to Cyber Essentials Plus (CE+) and charges less than £60 per user per month (excluding productivity licensing), you’re not getting a bargain — you’re buying a front-row seat to the next supply chain breach. China-backed hackers, Silk Typhoon, are targeting crap MSPs who cut corners on security, using their remote management tools to compromise every customer they support.
This isn’t theory — it’s happening right now, and businesses who blindly trust their providers without checking certification, audit history, or internal security are sitting ducks. Find out how cheap MSPs are fuelling the next wave of cyber attacks, and why CE+ should be your absolute minimum requirement for any provider touching your network.

Jaguar Land Rover Cyber Breach: Hackers Drive Off with Luxury Brand's Secrets!
Jaguar Land Rover—known for luxury, performance, and now, apparently, spectacular cybersecurity fails—has become the latest high-profile victim of a cyberattack. Hackers allegedly snatched critical internal documents, sensitive employee data, and the company's precious source code, then dumped it all online like yesterday's leftovers. As connected cars transform into rolling computers, cybercriminals are clearly buckling up for joyrides through corporate data. Is your business ready, or are you just waiting your turn to become tomorrow’s headline? Time to shift gears and get serious about cybersecurity—before it's too late.

Microsoft's March 2025 Patch Tuesday: 57 Vulnerabilities and a Side of Zero-Day Chaos
March 2025 Patch Tuesday just dropped a cybersecurity bombshell. Discover why your sleep-deprived IT team might never forgive Microsoft (and why your MSP had better be on this ASAP!).

Urgent Alert: Apple Users Under Attack—Is Your Device Safe?
Is your Apple device silently compromised? Hackers are exploiting a dangerous new vulnerability RIGHT NOW—find out if you're at risk and how to protect yourself immediately!

Eleven11 Botnet: The Newborn Monster That Can DDoS You Into Next Week
Meet Eleven11, the brand-new botnet responsible for record-shattering DDoS attacks peaking at 3.6 Tbps. This fast-growing menace, built from 30,000 compromised devices, can cripple networks, wipe out online businesses, and expose weak cybersecurity in minutes. Find out how it works, why it’s terrifying, and what every business should do right now to avoid becoming the next victim.

Leuma Stellar: The Malware That Wants Your Crypto and Thinks You’re Dumb Enough to Hand It Over
Hackers are using fake PDFs disguised as bot detection images to deliver Leuma Stellar, malware designed to steal cryptocurrency wallets, logins, and browser data. Find out how this ridiculously simple scam works, why businesses and crypto holders should care, and how to lock down your assets before your Bitcoin buys someone else’s Lamborghini.

Rayhunter – The Free Tool That Lets You Spot Stingrays Before They Hoover Up Your Life
Stingrays are tracking devices disguised as phone towers, used to spy on your location, calls, and messages. The EFF’s free open-source tool Rayhunter lets you detect these covert surveillance devices — putting control of your privacy back in your hands. Find out how Stingrays work, why Rayhunter matters, and why your phone is probably betraying you right now.

Microsoft Signed a Shit Driver, Now Hackers Have the Keys to Your Entire F’ing Network
Microsoft signed a vulnerable driver, and ransomware gangs couldn’t believe their fucking luck. With SYSTEM access gifted on a plate, malware could disable your antivirus, wipe your backups, and redecorate your operating system. This is what happens when you trust Microsoft to check their own homework. Learn how it happened, why BYOVD is back, and what you need to do before your network becomes the next crime scene.

Artificial Intelligence in Cybersecurity: The Digital Arms Race No One Asked For
Cybersecurity has become an AI-driven arms race. Attackers now use AI to automate phishing, bypass security, and mimic human behavior to slip past defences. Meanwhile, AI-powered security tools fight back, detecting threats in real-time.
But most businesses are unprepared. If your security relies on outdated defences, you’re already losing. AI isn’t just changing cybersecurity—it’s redefining it.
The only way to stay ahead? Cyber Essentials Plus as your baseline. Anything less, and you’re gambling while cybercriminals use AI to exploit weaknesses.

Cyber Essentials: Does It Work and Is It Worth the Effort for Small Businesses?
Cyber Essentials is a government-backed certification that helps small businesses get basic cybersecurity right. But does it actually work, and is it worth the time and money? In this article, we look at what Cyber Essentials involves, how much it costs, and whether it genuinely protects your business from cyber threats. With fresh insights from the UK government’s 2024 evaluation, we uncover the real-world benefits for small businesses.

Why Small Businesses Are a Hacker’s Favourite Snack (And How Not to Be One)
Small businesses love to think they’re “too small” for hackers to bother with. Reality check: that’s exactly why cybercriminals love you. No security team. No proper defences. Just an unlocked digital front door and a password that might as well be ‘password123’. If you’re not taking cybersecurity seriously, you’re practically begging to be hacked.
In this post, we break down why small businesses are an easy target, the biggest security mistakes they make, and how Cyber Essentials can stop your business from becoming a cybercriminal’s next easy payday. Spoiler: it’s easier (and cheaper) than you think.
⚠️ Full Disclaimer
This is my personal blog. The views, opinions, and content shared here are mine and mine alone. They do not reflect or represent the views, beliefs, or policies of:
My employer
Any current or past clients, suppliers, or partners
Any other organisation I’m affiliated with in any capacity
Nothing here should be taken as formal advice — legal, technical, financial, or otherwise. If you’re making decisions for your business, always seek professional advice tailored to your situation.
Where I mention products, services, or companies, that’s based purely on my own experience and opinions — I’m not being paid to promote anything. If that ever changes, I’ll make it clear.
In short: This is my personal space to share my personal views. No one else is responsible for what’s written here — so if you have a problem with something, take it up with me, not my employer.