Social Engineering techniques, Support Scams

The following article is the third of a series of articles on cyber attacks and the second of a series of three articles on social engineering techniques, and focuses on support scams. How many times have we heard of hacks resulting from social engineering techniques? Social engineering practices are used mostly because it’s easier to exploit someone […]

Read More

The various types of cyber attacks

  With ever increasing reliance on the internet, especially in business-related environments, internet fraud has risen exponentially over the past few years. Nowadays most of our information is online, accessible and visible to everyone, almost every business has a webpage introducing their employees and their roles, and these employees themselves use at least one social […]

Read More

Multi layered defence in an uncertain world

    In a recent article we looked at human error and the need for policies and training to help your staff protect your business from cyber-attack and data breach. These issues are significant and important steps in the process of building a secure infrastructure, one element of the multi layered defence that businesses and […]

Read More

Cookies, a guide to these often mysterious objects

  More and more often we hear people talking about cookies, how to block them, how to use them… But what are they? Chocolate biscuits? Sweets? Well, they are much less sweet and a bit more complicated than that! The term cookie was first used back in 1994, by the computer programmer Lou Montulli. He […]

Read More

A deviation from intention, expectation or desirability

  That is a definition of human error and in the context of cyber security human error is certainly not desirable! Even the most careful and diligent of us make errors in life, in the workplace it’s normally because we are under pressure to complete tasks or projects against tight deadlines and we lose sight […]

Read More

Have your emergency contact available even when your smartphone is locked

  Up to a few years ago most of us had our emergency contacts saved on our mobile phone under the name ICE (in case of emergency), this would allow anyone who needed to contact our loved ones to quickly find the details on our phone. However, with improved security measures, nowadays most smartphones are […]

Read More

Have a great holiday – but stay secure

The weather is getting warmer, the schools are closing down for the long summer break and thoughts turn to that longed for holiday. At last, a chance to rest up and leave all your cares behind. Well……..almost Whilst relaxation is at the top of your agenda, criminals see this as a very productive time of […]

Read More

The General Data Protection Regulation (GDPR) and organisational security

  Implementation of the GDPR in the UK is now less than a year away and much is being written about this major step change in data protection regulation. The overall requirements, prospective fines for data breach and breach reporting obligations are all headline topics and deservedly so. If your organisation processes personal data concerning […]

Read More