DIGITAL MAGAZINE | CYBER SECURIUTY AWARENESS
At apex Computing, our mission is simple - to make IT simple - to empower North West businesses with the tools, knowledge, and confidence to thrive securely in a digital-first world.
Cyber threats are constantly evolving, but so too are the opportunities to strengthen your defences. For us, cyber security isn't just about technology - it's about people. It's about building awareness, good habits, and a culture of security across every team.
This digital magazine brings together our key insights: from phishing and password best practices, to leadership strategies that shape stronger security cultures. Each article is designed to help you take practical, meaningful steps towards greater cyber resilience.
Did you know: Over 40% of UK cyber attacks hit SMEs. Hackers automate their scams - not their ethics.
Read our article about SMEs cyber scams here for more insights.
Did you know: This is only true if you have multi-factor authentication (MFA) enabled! Passwords are breached daily (even complex ones). MFA is your bodyguard.
Read how just one weak password can cripple your business here.
Did you know: Cyber security is a shared responsibility. While Cloud does secure your platform, you are responsible for securing the data and how your people use that. Just because something is on the Cloud doesn't mean it can't be downloaded and shared elsewhere.
Did you know: Antivirus is a great cyber security tool, but in reality it's like locking your front door but leaving the windows wide open. Layered defence is essential in today's cyber security landscape.
Did you know: Many breaches sit undetected for over 200 days! Silence is the real danger.
Cyber threats are evolving faster than ever - and for small and medium-sized enterprises (SMEs), the risks are multiplying. As 2026 approaches, attackers are combining automation, artificial intelligence (AI), and social manipulation to outsmart traditional defences. Here at the top 5 threats every business should keep on their radar.
For SMEs, cyber security in 2026 isn't just about defending against attacks - it's about building resilience. With threats becoming more sophisticated, prevention, detection and response must all work together. The businesses that thrive will be the ones that treat cyber security not as a checkbox, but as a culture.
Phishing remains the number one way cyber criminals infiltrate businesses - and BEC attacks are becoming increasingly personal.
In 2026, expect to see highly convincing emails that appear to come from trusted contacts, complete with correct branding, tone, and even AI-generated writing styles.
Attackers are using stolen data from previous breaches to craft believable messages that trick staff into transferring money or credentials.
Tip: Regular staff training, multi-factor authentication (MFA), and real-time threat monitoring are key to defending against BEC scams.
Ransomware is no longer the domain of elite hackers. Ransomware-as-a-Service gives anyone with bad intentions access to ready-made malware kits and payment portals. The result? A surge in low-skill but high-volume attacks targeting SMEs - the most profitable "sweet spot" for criminals who know smaller firms often lack enterprise-grade protection.
Tip: Keep offline backups, patch systems regularly, and use endpoint detection and response (EDR) solutions to detect suspicious activity early.
As more businesses move data and applications to the cloud, misconfigurations are fast becoming one of the biggest sources of data leaks.
From poorly configured access controls to unencrypted storage buckets, even small error can expose sensitive data publicly or to cyber criminals scanning for vulnerabilities.
Tip: Regularly audit your cloud security settings and use automated configuration tools to ensure compliance and visibility.
AI has created a new class of threats. Deepfake voice scams are on the rise, with attackers cloning voices of executives or suppliers to authorise payments or extract confidential information.
Meanwhile, "AI engineering" - the malicious manipulation of AI systems or data sets - is emerging as a powerful attack vector. Compromised AI models can produce misleading results, corrupt data, or open back doors for attackers.
Tip: Establish strict verification processes for voice or video instructions and monitor AI systems for abnormal activity or data drift.
In 2026, attackers are increasingly bypassing direct defences by targeting suppliers, software vendors, and managed service providers.
A single compromised partner can create a cascade of risk across the entire business ecosystem - something SMEs often overlook. Cyber criminals know this and are exploiting trusted relationships to deliver malware or steal credentials through legitimate channels.
Tip: Evaluate the security posture of your suppliers, insist on transparency in cyber security practices, and segment your network to reduce the blast radius of a breach.
We spoke to one of our T3 Engineers, Ross, who has been with Apex Computing since February 2024!
Ross started his IT career in one of the UK's largest construction companies, joining the IT support side of the industry a few years later.
Leaders don't need to be cyber experts - they need to make cyber a business priority. Ask: "How secure are we compared to where we want to be?".
Include a "Cyber Moment" in every board meeting. Two minutes on one security update. Keep it visible.
When someone reports a phishing email or flags a risk, celebrate it like a sales win. Reward curiosity.
Empower teams to question unusual emails, challenge requests, and learn. Make security approachable, not fearful.
Collaborate with partners (like Apex) for regular audits, tabletop exercises, and roadmap sessions. Cyber maturity is a journey, not a checkbox.