Cyber Security? It’s essential
When you hear ‘cyber security’ you may start to nod off – unless you’re me! But the fact is cyber security is essential for business.
When you hear ‘cyber security’ you may start to nod off – unless you’re me! But the fact is cyber security is essential for business.
There are a few different names this blight goes by with 'Cat Phishing' and 'Romance Scams' being the most common. Let’s talk about what these are, how they work and how you could help yourself return those criminal Valentine’s to sender.
OSINT is an acronym for Open Source Intelligence. Essentially gathering and using information freely scattered about the interweb. How could this help a business in terms of Cyber Security?
There have been some interesting developments in the security world over the last few days which we wanted to make you aware of. A recent vulnerability was published in a Java based log processing tool (Log4J) which has been assigned the highest severity rating.
When you drive your car, you can trust that its safe because each year you go and get that all important MOT; checking that the tyres are legal, or the lights are working, nothings loose and about to fall apart. Guess what?! Cyber Essentials is sort of the same, but for cybersecurity!
Have you ever wondered how to create complex passwords, then this is the tutorial for you!!
As the CORONApocalypse continues to fade and we all get back to whatever normal is, it's a good opportunity to look back at the changes we have made in the workplace over the last 12-16 months to keep our businesses going and ask ourselves, "is this good?".
We always talk about the technical elements of cybersecurity, what tools, software, and processes that you should use to protect your business. Cybersecurity and data protection (or the failure to truly consider this as an essential forethought) rather than an afterthought is by far of significance importance today.
We’re all aware that we need to be vigilant of our own cyber security and it goes without saying that this should be of paramount importance to any business. The news of the recent Microsoft hack is a stark reminder of just how vital it is to have cyber security monitoring in place.
I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they're called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I'll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.
Cybercrime is on the rise and the types of phishing scams are evolving, our ability to identify them has never been more important in both protecting ourselves, but also the organisations that we are part of. There are many types of phishing scams with many different tactics employed, in this article we look at some of the main phishing scams used by the criminals, the intent or nature them and advice on how to deal with them.