Understanding The Cyber Kill Chain

An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months and even years. Lockheed developed the Cyber Kill Chain with the idea that if we identify threats early enough, this will reduce the possibility of an advanced persistent threat. The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops the enemy activity.

Cyber Security – The current state of play and how you can protect your business.

Cyber Security - The Current State of Play

As part of their thought leadership series, our partners at Microwarehouse held an online event entitled “Cyber Security: The Current State of Play”. The event was moderated by Guido Marchetti – Microsoft Modern Work & Security Lead at Microwarehouse and the speakers included Des Ryan – Director of solutions and cyber security for Microsoft Ireland, […]

2021 Threat Intelligence Shows Attacks Rising Across the Board

2021 Threat Intelligence Shows Attacks Rising Across the Board

While the world continued to grapple with the challenges of 2020 — such as the ongoing COVID-19 pandemic and the shift to remote work — cybercriminals were building on what they learned that year to become more adaptable and formidable in 2021.

Beware of Email and SMS Compromise Scams

Cyber Security Awareness Training

This week sees the gradual return to the office with the easing of restrictions and while many companies will adopt fully remote or hybrid working, many more look forward to having their teams back in the office. Cybercriminals tend to take advantage of any situational changes and we are already seeing an uplift in scams.

The 12 Scams of Christmas

12 Scams of Christmas

It may be the season of goodwill and a time for giving but this Christmas we are asking you to be a bit of a Scrooge and don’t gift your finances or data to potential scammers. Here are some of the most common scams you are likely to experience across email, text message and phone calls.

Cyber Security Month 2021 – Top Cyber Tips

Cyber Security Tips

As cyber-attacks and their consequences grow, the imperative for cybersecurity awareness has become increasingly evident to businesses, schools, and individuals. Attackers use a variety of vulnerabilities and phishing attacks to compromise the security of your networks and devices. To approach this threat effectively and protect your networks, it is vital to become familiar with the cyber essentials of your business and personal accounts, such as email, social media, and more so that you can better secure your information and identity online! October is Cyber Security Month #CyberSecMonth and here are some simple tips to help keep you safe online.

Cyber Attack – The Human Trigger

Cyber Attach The Human Trigger

Did you know that human error was a contributing factor in 95% of breaches? Since human error plays such a vast role in cyber breaches, addressing it is key to reducing the chances of your business being successfully targeted. It also allows you to protect your business from a far wider range of threats than any single technical solution could and can potentially empower your workforce to actively look out for and report new threats they may encounter. Mitigation of human error must be key to business cybersecurity in 2021.

What is 2 Factor Authentication and What are the Benefits?

Benefits of 2FA

2 Factor Authentication or 2FA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online services. By implementing 2FA you are telling the online service that you are in fact, who you claim to be.

70% of Enterprise Ransomware Victims Pay Up

ransomware

The world most valuable resource is no longer oil, but data. So what happens when this most valuable of assets is compromised or stolen? Would you pay to get it back or prevent its release to the wilds of the internet? Recent data suggests that 70% of enterprise ransomware attacks result in the criminals successfully eliciting payment from their victims.