Latest Email Scams

Unfortunately the scammers aren’t going away and I think it’s fair to say that this is going to get worse before it gets better and that’s if it gets better at all. The fact is that despite the efforts of the many security companies to stay ahead of the cyber-criminals, it can be extremely difficult to stop […]

How to check if your Twitter Account has been hacked

How to Check if Your Twitter Account has been Hacked Have you ever wondered if your Twitter account has been hacked and who may have gained access to it? While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. […]

Google are now marking HTTP sites as “Not Secure”

Google are now marking HTTP sites as “Not Secure”

Google are now marking HTTP sites as “Not Secure” At the start of July Google released the Chrome 68 update and since then they have been marking all HTTP sites as ‘not secure’.Google has been giving gentle nudges to users for a number of years to encourage them encrypt their sites with HTTPS starting in […]

Email is the Number One Threat Vector

Email is the Number One Threat Vector

The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that clog […]

Disaster Recovery as a Service (DRaaS) Explained

When you hear the phrase “Disaster Recover” your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on […]

Meltdown and Spectre

Meltdown and Spectre

What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to contend with. Meltdown and Spectre are two security vulnerabilities discovered in modern microprocessor chips that may allow attackers to exploit the chips common features and puts your personal data, including passwords, at risk. People are […]

Do you know where that USB device came from

STOP!! – Do you know where that USB stick or memory card came from? Was it delivered in the post? Did you simply find it on the ground and thought “What better way to establish who owns it than to plug it into my computer and see the owner’s details are on it”. Did you […]

Don’t ignore the elephant in the room

By now I’m sure you’ve heard of the impending apocalypse known as GDPR. Or at least that’s what some advisors would have you believe.  In truth, a lot of it is interpretation. How much you change your business to achieve some semblance of compliance depends entirely on your unique set of circumstances. The important thing […]

BadRabbit Ransomware

Writing about ransomware is starting to feel like a full-time job and unfortunately only days after my latest ransomware piece, I find it necessary to warn you, once again about the latest threat. BadRabbit ransomware attacks started on October 24th and are currently ongoing. At the time of writing, attacks have so far taken place […]

Cyber Security – Top Tips

It seems that there is a new cybersecurity threat emerging, every other day with ransomware and other phishing scams being the most prevalent. In that past I have written in detail about ransomware and the steps you should take to minimise your likelihood of attack. I recommend reading my piece “Ransomware – The complete survival […]

Download The Social Engineering Guide

Fill in your details below and hit download.