The following article is the fourth of a series of articles on cyber attacks and the last of a series of three articles on social engineering techniques, and focuses on social media scams. With Facebook averaging 1.71 billion monthly users and rising, Twitter with 313 million monthly users not to mention the other popular platforms, social media is […]
Social Engineering techniques, Support Scams
The following article is the third of a series of articles on cyber attacks and the second of a series of three articles on social engineering techniques, and focuses on support scams. How many times have we heard of hacks resulting from social engineering techniques? Social engineering practices are used mostly because it’s easier to exploit someone […]
The various types of cyber attacks. Social Engineering and various phishing techniques
The following article is the second of a series of articles on cyber attacks and the first of a series of three articles on social engineering techniques, and focuses on phishing scams. How many times have we heard of hacks resulting from social engineering techniques? Sadly, way too many times social engineering has […]
The various types of cyber attacks
With ever increasing reliance on the internet, especially in business-related environments, internet fraud has risen exponentially over the past few years. Nowadays most of our information is online, accessible and visible to everyone, almost every business has a webpage introducing their employees and their roles, and these employees themselves use at least one social […]
Multi layered defence in an uncertain world
In a recent article we looked at human error and the need for policies and training to help your staff protect your business from cyber-attack and data breach. These issues are significant and important steps in the process of building a secure infrastructure, one element of the multi layered defence that businesses and […]
Cookies, a guide to these often mysterious objects
More and more often we hear people talking about cookies, how to block them, how to use them… But what are they? Chocolate biscuits? Sweets? Well, they are much less sweet and a bit more complicated than that! The term cookie was first used back in 1994, by the computer programmer Lou Montulli. He […]
A deviation from intention, expectation or desirability
That is a definition of human error and in the context of cyber security human error is certainly not desirable! Even the most careful and diligent of us make errors in life, in the workplace it’s normally because we are under pressure to complete tasks or projects against tight deadlines and we lose sight […]
Have your emergency contact available even when your smartphone is locked
Up to a few years ago most of us had our emergency contacts saved on our mobile phone under the name ICE (in case of emergency), this would allow anyone who needed to contact our loved ones to quickly find the details on our phone. However, with improved security measures, nowadays most smartphones are […]
Have a great holiday – but stay secure
The weather is getting warmer, the schools are closing down for the long summer break and thoughts turn to that longed for holiday. At last, a chance to rest up and leave all your cares behind. Well……..almost Whilst relaxation is at the top of your agenda, criminals see this as a very productive time of […]
The General Data Protection Regulation (GDPR) and organisational security
Implementation of the GDPR in the UK is now less than a year away and much is being written about this major step change in data protection regulation. The overall requirements, prospective fines for data breach and breach reporting obligations are all headline topics and deservedly so. If your organisation processes personal data concerning […]