Safeguarding Personal Information: A Guide for Employees
In today’s digital world, safeguarding personal and company information is not just important, it’s essential.
New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts
A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks to target Microsoft 365 accounts belonging to corporate executives. The campaign, which researchers from Mitiga discovered during an incident response case, is now widespread and is targeting transactions worth several million dollars each. The phishing […]
The 12 Scams of Christmas
It may be the season of goodwill and a time for giving but this Christmas we are asking you to be a bit of a Scrooge and don’t gift your finances or data to potential scammers. Here are some of the most common scams you are likely to experience across email, text message and phone calls.
Cyber Security Month 2021 – Top Cyber Tips
As cyber-attacks and their consequences grow, the imperative for cybersecurity awareness has become increasingly evident to businesses, schools, and individuals. Attackers use a variety of vulnerabilities and phishing attacks to compromise the security of your networks and devices. To approach this threat effectively and protect your networks, it is vital to become familiar with the cyber essentials of your business and personal accounts, such as email, social media, and more so that you can better secure your information and identity online! October is Cyber Security Month #CyberSecMonth and here are some simple tips to help keep you safe online.
Ransomware – Do You Trust Your Inbox?
Email is the No.1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by the recipient of an email. So, do you trust your inbox? The following tips are designed to help you investigate an email and avoid falling victim to a ransomware or other cyber-attack.
Five Tips to Avoid Phishing Attacks
Practically everyone has heard of or read about phishing emails and the reason we all know about them is that they just won’t go away. As far back as 2010, we were warning our clients about these malicious emails
Email is the Number One Threat Vector
The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that clog […]
Cybercrime Part 3 – Fighting the Attack
[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” […]
Are you ready for GDPR?
The General Data Protection Regulation (“GDPR“) will come into effect on 25 May 2018 replacing the existing data protection framework under the EU Data Protection Directive. It has been described as the most ground-breaking piece of EU legislation in the digital era. The aim of GDPR is to make businesses more accountable in data privacy […]