Which company has become the #1 most imitated in phishing scams? We’ll tell you more…
Is your business data at risk? Don’t take chances with old tech
Old computers and external drives can put your sensitive business data at risk.
We look at how to dispose of old computers and external drives in the safest way possible.
Take action to avoid a devious new phishing scam
Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.
When can you finally forget your password?
Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.
Don’t walk the plank with pirated software
A huge number of small and medium-sized businesses would consider using pirated software to try and save money. Don’t do it.
Are you using Teams to share sensitive data?
Microsoft Teams has fast become one of THE most useful business tools for the way we work today. No matter where your people work from, they can communicate and collaborate quickly and reliably. But this remote way of working can also open the door to some MAJOR security issues. New research shows that nearly HALF of employees frequently share confidential …
You Need to Watch Out for Reply-Chain Phishing Attacks
Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a ransomware attack for a payout. Or possibly plant spyware to steal sensitive info. Sending a phishing email can do them … Read More
Android 13 is safer for your business
We all use our phones for a lot more than sending messages and making the occasional call. And that means most of your staff are probably using their personal mobile for work now and then. Everyone does it. The downside of this is it puts your business data at risk. If it can be accessed on a personal mobile and … Read More
None of your team would fall for this trick… would they?
Cyber criminals have a reputation for constantly coming up with new ways to scam us into handing over login details or sensitive data. And while you might think your team would spot an attempted attack, you could be surprised. We’ve seen a lot of intelligent people – including many business leaders – caught out over the years. One of the … Read More
Signs That Your Computer May Be Infected with Malware
Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses Ransomware Spyware Trojans Adware Key loggers And more The longer that malware sits on your system unchecked, the more damage … Read More
- Page 1 of 2
- 1
- 2