Blog

ITogether is now offering KnowBe4 in New Zealand

ITogether is now offering KnowBe4 in New Zealand

From phishing resilience to culture change, ITogether helps organisations strengthen their human firewall and we are extending that support to New Zealand with KnowBe4. Why This Matters Firewalls. EDR. Zero Trust. Most organisations already have strong technology in...

read more
Cyber Attack: The M&S Story

Cyber Attack: The M&S Story

Inside the Marks & Spencer Cyberattack: How It Happened, What Went Wrong, and How It Could Have Been Stopped In April 2025, Marks & Spencer — one of the UK’s best-known high street retailers — found itself facing something far more damaging than an...

read more
Hallo Amsterdam!

Hallo Amsterdam!

We’re excited to share that ITogether has expanded into mainland Europe with a new office in Amsterdam. This marks an important step forward in our mission to support clients with secure, scalable network and cybersecurity solutions – wherever they operate. As demand...

read more
Lunch & Learn Webinar: Patching That Works

Lunch & Learn Webinar: Patching That Works

10 June 2025 | 13h00 - 14h00 BST in collaboration with Yorkshire Cyber Security Cluster and Action 1 👉 Register Here Keeping your endpoints patched can be a nightmare. Enter Action1, the autonomous endpoint management platform that patches OS and third-party software...

read more
What Can ITogether Do For You?

What Can ITogether Do For You?

Many of our customers come to us for a specific service, whether that’s managed network or cybersecurity support, but what often surprises them is just how wide our expertise runs. From cloud connectivity solutions for hybrid workforces to round-the-clock threat...

read more
ITogether & WCBCS: Supporting the Local IT Community

ITogether & WCBCS: Supporting the Local IT Community

Here at ITogether, we believe in fostering collaboration and professional growth in the IT community. That’s why we’re excited to be working with the West Yorkshire BCS Branch (WYBCS), a volunteer-led group that runs free events for IT professionals in the region....

read more
The Ransomware Racket Has Changed 

The Ransomware Racket Has Changed 

For years, ransomware attacks followed a predictable pattern: hackers would break in, encrypt sensitive business data, and demand payment for the decryption key. Businesses had two options—restore from secure backups or pay up. But now, cybercriminals have realised...

read more
The First Ransomware Attack: A Floppy Disk’s Legacy

The First Ransomware Attack: A Floppy Disk’s Legacy

In December 1989, thousands of individuals received an unexpected package: a floppy disk labelled "AIDS Information Introductory Diskette." This seemingly benign disk would later be recognised as the vehicle for the world’s first ransomware attack, marking the dawn of...

read more
WEBINAR – API Security: Risk & Defence

WEBINAR – API Security: Risk & Defence

APIs (Application Programming Interfaces) are the digital glue holding organisations together. They enable software and systems to communicate, automate workflows, and enhance user experiences. But as their use grows, so does the risk of API security breaches....

read more
Recorded Future’s Threat Analysis Report

Recorded Future’s Threat Analysis Report

The latest cyber Threat Analysis Report from Recorded Future’s Insikt Group provides a deep dive into the most significant cyber threats of 2024 and outlines key predictions for 2025. As cybercriminals adapted to law enforcement crackdowns, businesses struggled with...

read more
When Ransomware Hits Close to Home

When Ransomware Hits Close to Home

Blacon High School in Chester, UK, recently became the latest victim of a ransomware attack... Hackers infiltrated their systems, locked critical files, and brought the school to a standstill. Students were sent home, teachers scrambled to adapt lessons to remote...

read more
Cybersecurity in New Zealand and the UK

Cybersecurity in New Zealand and the UK

Cybersecurity in New Zealand and the UK: A Shared Responsibility  It was a typical Monday morning when James*, a small-business owner in Christchurch, opened his email and froze. The subject line read: “Your system has been compromised.” The sender demanded...

read more
Why Vendor Vulnerability Data Matters in Cybersecurity

Why Vendor Vulnerability Data Matters in Cybersecurity

As cyber threats grow more sophisticated, the ability of organisations to defend themselves depends heavily on their vendors’ speed and efficiency in addressing known, published vulnerabilities. Often referred to as CVE’s.  One key aspect that often gets...

read more
Don’t miss our Cybersecurity Land Rover Experience Events

Don’t miss our Cybersecurity Land Rover Experience Events

Book Here Mark your calendars for 26 March and 15 May as we take you on the muddiest cybersecurity events in Yorkshire!  What to Expect  Our Land Rover Experience cybersecurity events provide an extraordinary setting to gain valuable insights and create...

read more