The Insider Threat

A SANS survey, run between June and August 2017, has shown that ransomware, insider threats and Denial of Service attacks are considered the top three cyber security threats faced by organisations and the insider threat can be considered to be the main security threat in 2017. Well trained employees should be the first line of […]

Read More

DDoS attacks

A Distributed Denial of Service (DDoS) attack is when the cyber-criminal uses many unique IP addresses, flooding the target with incoming traffic. The first Denial of Service attack was demonstrated in 1997 during a DEF Con event in Las Vegas, disrupting internet access to the Las Vegas strip for over an hour. The following year […]

Read More

Malvertising – the “hidden” threat

The following article is the sixth of a series of articles on Cyber Attacks and focuses on Malvertising   Malvertising, also known as malicious advertising, is a scam that takes advantage of online advertising in order to distribute malware to users’ devices with little or no interaction by them; first recorded in early 2008, it has become […]

Read More

Drive by Downloads

  The following article is the fifth of a series of articles on Cyber Attacks and focuses on drive by downloads. Used in many of the most common cyber-attacks, drive by downloads are hard to spot and involve little or none interaction by the victim. A drive by download can either be a download authorised by the […]

Read More

Social engineering techniques, Social Media scams

  The following article is the fourth of a series of articles on cyber attacks and the last of a series of three articles on social engineering techniques, and focuses on social media scams. With Facebook averaging 1.71 billion monthly users and rising, Twitter with 313 million monthly users not to mention the other popular platforms, social media is […]

Read More

Social Engineering techniques, Support Scams

The following article is the third of a series of articles on cyber attacks and the second of a series of three articles on social engineering techniques, and focuses on support scams. How many times have we heard of hacks resulting from social engineering techniques? Social engineering practices are used mostly because it’s easier to exploit someone […]

Read More

The various types of cyber attacks

  With ever increasing reliance on the internet, especially in business-related environments, internet fraud has risen exponentially over the past few years. Nowadays most of our information is online, accessible and visible to everyone, almost every business has a webpage introducing their employees and their roles, and these employees themselves use at least one social […]

Read More

Multi layered defence in an uncertain world

    In a recent article we looked at human error and the need for policies and training to help your staff protect your business from cyber-attack and data breach. These issues are significant and important steps in the process of building a secure infrastructure, one element of the multi layered defence that businesses and […]

Read More