SOCIAL ENGINEERING: A Guide to Understanding the Attacks and How to Mitigate the Risks
Introduction The landscape of cybersecurity threats is continually evolving and has largely transcended the traditional methods of hacking and virus distribution. Today, social engineering attacks have emerged as one of the most insidious and effective means of attack, relying on manipulation and psychology instead of technical expertise. Modern IT systems are difficult to infiltrate from […]
Protecting Your Business from CEO and Invoice Fraud
Protecting your business from financial fraud has become more critical than ever before, with all to frequent reports of unsuspecting businesses falling victim to criminals. CEO fraud and invoice fraud are two common types of scams that have cost small firms in Ireland millions of euros. The Banking and Payments Federation Ireland’s (BPFI) via FraudSMART […]
New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts
A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks to target Microsoft 365 accounts belonging to corporate executives. The campaign, which researchers from Mitiga discovered during an incident response case, is now widespread and is targeting transactions worth several million dollars each. The phishing […]
Pig Butchering Scams – What are they and how to avoid them
From business email compromises to romance scams, criminals are raking in billions by using one powerful tool: social engineering. They lure their victims into making mistakes that could cost them everything – whether it’s trusting someone they shouldn’t or sending their hard-earned money into a black hole. But just when we thought we’d seen it […]
Email Remains The Number One Threat Vector
Attention all businesses: Are you aware of the dangerous threat lurking in your employees’ inboxes? Back in 2018 we warned that the greatest threat to your organisation Is sitting in the inboxes of your employees. Despite advancements in cyber defence, this is still the case and it’s becoming easier for bad actors to target your […]
Phishing Prevention Guide
By now, most people who have access to email (which is a lot of people) are aware of phishing and may have even fallen victim to or encountered a phishing attempt. Phishing is a type of online fraud in which attackers send fake emails or texts, or create fake websites, in an attempt to trick […]
Why are humans the biggest insider threat to your business?
Employees have long been viewed as the ‘weakest link’ in a business’s cyber security chain and, with human error still being the number one cause of data breaches, that unwanted title can still be applied to many businesses today. But what makes employees such an insider threat to your business? In this article, we’ll guide you through […]
Cyber Insurance Checklist: 10 Essential Security Controls
The never-ending threat of a cyberattack is leading more and more businesses to take a serious look at cyber security insurance to help them recover some of the financial losses that would result from an attack or incident. While a continuing rise in attacks is making cyber insurance more attractive, so too, is it making […]
Understanding The Cyber Kill Chain
An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months and even years. Lockheed developed the Cyber Kill Chain with the idea that if we identify threats early enough, this will reduce the possibility of an advanced persistent threat. The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops the enemy activity.
Cyber Security – The current state of play and how you can protect your business.
As part of their thought leadership series, our partners at Microwarehouse held an online event entitled “Cyber Security: The Current