Be safe online on Black Friday and Cyber Monday

  Black Friday and Cyber Monday are fast approaching. This year it is estimated that shoppers in the UK will spend an enormous £4.5 billion across the weekend and much of that spend will be online. This represents a potential bonanza for cyber criminals so be careful as you hit the internet with your credit […]

Read More

Social Media Practices for Businesses

  In a world driven by the internet, social media has become an essential element of business reality; almost every company uses Social Networks to expand its online presence and reach potential and existing client. But, like for every internet-connected technology, Social Networks can pose risks for your company both in terms of cyber security […]

Read More

Good Password Practice

Even though World Password Day was on the 4th of May, we should treat every day as a password day. Everything that has fundamental importance in our lives is password protected: your computer, your bank account, your house, your smartphone… And each and every one of the password protected devices stores some very sensitive data […]

Read More

The Insider Threat

A SANS survey, run between June and August 2017, has shown that ransomware, insider threats and Denial of Service attacks are considered the top three cyber security threats faced by organisations and the insider threat can be considered to be the main security threat in 2017. Well trained employees should be the first line of […]

Read More

DDoS attacks

A Distributed Denial of Service (DDoS) attack is when the cyber-criminal uses many unique IP addresses, flooding the target with incoming traffic. The first Denial of Service attack was demonstrated in 1997 during a DEF Con event in Las Vegas, disrupting internet access to the Las Vegas strip for over an hour. The following year […]

Read More

Malvertising – the “hidden” threat

The following article is the sixth of a series of articles on Cyber Attacks and focuses on Malvertising   Malvertising, also known as malicious advertising, is a scam that takes advantage of online advertising in order to distribute malware to users’ devices with little or no interaction by them; first recorded in early 2008, it has become […]

Read More

Drive by Downloads

  The following article is the fifth of a series of articles on Cyber Attacks and focuses on drive by downloads. Used in many of the most common cyber-attacks, drive by downloads are hard to spot and involve little or none interaction by the victim. A drive by download can either be a download authorised by the […]

Read More

Social engineering techniques, Social Media scams

  The following article is the fourth of a series of articles on cyber attacks and the last of a series of three articles on social engineering techniques, and focuses on social media scams. With Facebook averaging 1.71 billion monthly users and rising, Twitter with 313 million monthly users not to mention the other popular platforms, social media is […]

Read More