Knowing your cyber threats – Understanding the defences

As we explored in our previous article, due to the rapidly increasing levels of cyber criminality being experienced by businesses of all sizes all over the globe, it is essential that you take the cyber security of your organisation seriously. We explored in detail two of the world's most common forms of cyber attack, favoured by cyber criminals for their ease and average likelihood of success - this high success rate is due to the attack needing the user to ‘authorise’ the attack.

Knowing your cyber threats – A user’s influence

There is no longer any doubt - cyber security must be at the very heart of your business concerns – especially bearing in mind that the levels at which cyber threats are growing and evolving are alarming to say the least. Alongside the massive rise in frequency and severity of cyber attacks around the world comes a sort of obliviousness to them.

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption […]

Is your laptop spying on you?

Strict parents can monitor their kids’ online activities, law enforcement officers can see your outgoing messages, and some employers can (unethically) check whether employees are on Facebook during working time. All they need to do is install a keylogger on one’s computing device. Let’s get to know more about keyloggers and how you can protect […]

VoIP phishing: how scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc. Here’s how different types of malware work and […]

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry — a ransomware deemed ‘one of the worst in history’ — many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small […]

When did you last update your firmware?

Most IT consultants constantly remind clients of how important it is to update and patch their software, but neglect the importance of updating hardware. We don’t mean replacing it with new hardware; we mean updating the applications and settings coded into the physical IT powering every modern office. What is firmware? Firmware is a very […]