It may be the season of goodwill and a time for giving but this Christmas we are asking you to be a bit of a Scrooge and don’t gift your finances or data to potential scammers. Here are some of the most common scams you are likely to experience across email, text message and phone calls.
Did you know that human error was a contributing factor in 95% of breaches? Since human error plays such a vast role in cyber breaches, addressing it is key to reducing the chances of your business being successfully targeted. It also allows you to protect your business from a far wider range of threats than any single technical solution could and can potentially empower your workforce to actively look out for and report new threats they may encounter. Mitigation of human error must be key to business cybersecurity in 2021.
Most employees have sat in on manual handling courses, first-aid training, safe pass, health & safety meetings but few have ever participated in cyber training. If the inbox is the biggest threat to the business, then the casual nature of how it is used by staff must change
2 Factor Authentication or 2FA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online services. By implementing 2FA you are telling the online service that you are in fact, who you claim to be.
Email is the No.1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by the recipient of an email. So, do you trust your inbox? The following tips are designed to help you investigate an email and avoid falling victim to a ransomware or other cyber-attack.
Share on facebook Share on twitter Share on linkedin Brute Force Ransomware Attacks are on the Increase: A Strong Password Policy is your Best Defence Recent research by leading cybersecurity firms such as SonicWall, McAfee and F-Secure has found that brute force attacks are now the preferred means of spreading ransomware however, phishing emails remain […]
[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”no” min_height=”” […]