Blog

  • Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons

    Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons

    Browser add-ons have a funny reputation. They feel “small”. A quick install. A tiny productivity boost. A harmless little helper that lives in your toolbar. But in practice, a browser extension is more like a micro-SaaS vendor sitting inside your browser session. It can see what you see, interact with the pages you open, andRead…

  • LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams

    LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams

    A fake recruiter message is one of the cleanest social engineering tricks around because it doesn’t look like a trick. That’s why LinkedIn recruitment scams work so well inside real businesses.  They don’t arrive as malware. They arrive as a normal conversation that nudges someone toward one small action: click this link, open this file,Read…

  • “Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

    “Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

    In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive stuff, lock it away, and don’t leave passwords where someone can see them. In 2026, the same idea still matters but the “desk” has changed.  For many teams, the home office is now the default workspace, and that means physicalRead…

Archived posts

  • How Password Managers Protect Your Accounts

    Passwords unlock our digital lives. We use them for email, bank accounts, and more.  Remembering all these passwords is hard. Password managers help us keep our accounts safe and make our lives easier. What is a Password Manager? A password manager keeps all your passwords in one place. Think of it as a digital safeRead…

  • Innovative Solutions to IoT Device Security

    The Internet of Things is growing day by day. More devices are connecting to the internet. And with that growth comes new security risks. Let’s look at some new ways to keep your IoT devices safe. What are the security risks for IoT devices? IoT devices are vulnerable to many types of threats. Some ofRead…

  • 5 New Trends from a Study on the State of AI at Work

    The pace of technological advancement is accelerating. This is not news to anyone wading through the ChatGPT craze. Artificial intelligence (AI) is at the forefront of this revolution. We are swiftly seeing companies adopting AI solutions. Even more rapidly are software providers like Microsoft adding AI to tools.  The goal is to use AI toRead…

TSD Managed Services
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.