With so much of your time being spent in your inbox, it’s not surprising that this is where cybercriminals are increasingly targeting their victims. Your email is “The Number One Threat Vector” and Phishing emails are proving highly successful for cyber-criminals. The content for this post is courtesy of our partners at VadeSecure. Here you will learn how to detect a phishing email after which you should take the test to see if you can detect a phishing email. To find out how you can protect your inbox, please visit our Managed Email Security page by clicking on the button below.
The world most valuable resource is no longer oil, but data. So what happens when this most valuable of assets is compromised or stolen? Would you pay to get it back or prevent its release to the wilds of the internet? Recent data suggests that 70% of enterprise ransomware attacks result in the criminals successfully eliciting payment from their victims.
Practically everyone has heard of or read about phishing emails and the reason we all know about them is that they just won’t go away. As far back as 2010, we were warning our clients about these malicious emails
Share on facebook Share on twitter Share on linkedin Just over a year ago we published an article looking at how email is the number one threat vector and unfortunately this hasn’t changed. According to Danny Palmer of ZDNet, 99% of email attacks rely on the victims clicking on links. A very small number of attacks
Share on facebook Share on twitter Share on linkedin No matter where you go online, you can expect the scammers to be waiting to try and take advantage of you. Most of us are used to seeing scams pop up in our inboxes on a daily basis. By now you know the drill, if in
The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that
With the ongoing threat from cybercriminals using both high and low tech methods of identity theft, your data is your most prized possession. Like it or not you are no longer a person with a single identity. As we rely more and more on digital means to make our professional and personal lives more
Over the last few weeks we have seen a significant increase in reports of companies being targeted by a particular type of email scam that has been doing the rounds for a couple of years now.CEO Fraud is a scam in which cybercriminals spoof company email accounts and impersonate executives to try and fool an employee
In the final part in this series on cybercrime, I will highlight some other forms of cybercrime that you should be aware of and that have the potential to negatively impact your business operations. I will then finish off by summarising what has been covered throughout the series in a section titled "lessons learned" Other
To the Cyber-criminal, your browser is their gateway to your personnel information. There is a treasure trove of information available on your browser, be it credit card details, emails, browsing history, passwords, bank details etc. You can never be 100% secure when browsing the web. There are however several common-sense steps you can take