Black Friday and Cyber Monday are fast approaching. This year it is estimated that shoppers in the UK will spend an enormous £4.5 billion across the weekend and much of that spend will be online. This represents a potential bonanza for cyber criminals so be careful as you hit the internet with your credit […]
Social Media Practices for Businesses
In a world driven by the internet, social media has become an essential element of business reality; almost every company uses Social Networks to expand its online presence and reach potential and existing client. But, like for every internet-connected technology, Social Networks can pose risks for your company both in terms of cyber security […]
Good Password Practice
Even though World Password Day was on the 4th of May, we should treat every day as a password day. Everything that has fundamental importance in our lives is password protected: your computer, your bank account, your house, your smartphone… And each and every one of the password protected devices stores some very sensitive data […]
The Insider Threat
A SANS survey, run between June and August 2017, has shown that ransomware, insider threats and Denial of Service attacks are considered the top three cyber security threats faced by organisations and the insider threat can be considered to be the main security threat in 2017. Well trained employees should be the first line of […]
Why a Cyber Aware staff can be the first layer of protection for your business
There is little doubt that the threat of cyber-attack is one of the largest business risks of the current age. Not only have large organisations such as the NHS and Equifax become high profile victims of cyber-attacks, but there is a general increase in cyber threats at all levels of business – over half […]
DDoS attacks
A Distributed Denial of Service (DDoS) attack is when the cyber-criminal uses many unique IP addresses, flooding the target with incoming traffic. The first Denial of Service attack was demonstrated in 1997 during a DEF Con event in Las Vegas, disrupting internet access to the Las Vegas strip for over an hour. The following year […]
Malvertising – the “hidden” threat
The following article is the sixth of a series of articles on Cyber Attacks and focuses on Malvertising Malvertising, also known as malicious advertising, is a scam that takes advantage of online advertising in order to distribute malware to users’ devices with little or no interaction by them; first recorded in early 2008, it has become […]
Drive by Downloads
The following article is the fifth of a series of articles on Cyber Attacks and focuses on drive by downloads. Used in many of the most common cyber-attacks, drive by downloads are hard to spot and involve little or none interaction by the victim. A drive by download can either be a download authorised by the […]
Social engineering techniques, Social Media scams
The following article is the fourth of a series of articles on cyber attacks and the last of a series of three articles on social engineering techniques, and focuses on social media scams. With Facebook averaging 1.71 billion monthly users and rising, Twitter with 313 million monthly users not to mention the other popular platforms, social media is […]
Social Engineering techniques, Support Scams
The following article is the third of a series of articles on cyber attacks and the second of a series of three articles on social engineering techniques, and focuses on support scams. How many times have we heard of hacks resulting from social engineering techniques? Social engineering practices are used mostly because it’s easier to exploit someone […]