Social Engineering techniques, Support Scams
The following article is the third of a series of articles on cyber attacks and the second of a series of three articles on social engineering techniques, and focuses on support scams. How many times have we heard of hacks resulting from social engineering techniques? Social engineering practices are used mostly because it’s easier to exploit someone […]
The various types of cyber attacks. Social Engineering and various phishing techniques
The following article is the second of a series of articles on cyber attacks and the first of a series of three articles on social engineering techniques, and focuses on phishing scams. How many times have we heard of hacks resulting from social engineering techniques? Sadly, way too many times social engineering has […]
The various types of cyber attacks
With ever increasing reliance on the internet, especially in business-related environments, internet fraud has risen exponentially over the past few years. Nowadays most of our information is online, accessible and visible to everyone, almost every business has a webpage introducing their employees and their roles, and these employees themselves use at least one social […]
Multi layered defence in an uncertain world
In a recent article we looked at human error and the need for policies and training to help your staff protect your business from cyber-attack and data breach. These issues are significant and important steps in the process of building a secure infrastructure, one element of the multi layered defence that businesses and […]