Last Updated on 27th August 2019Phishing scams have been around for as long as the internet, and have been considered a serious threat for close to two decades. However, the techniques that scammers use are constantly changing. It’s important, both on the individual and the company level, to stay up-to-date with new phishing scams and … Read more Phishing Trends in 2019
Last Updated on 18th June 2019There are many different forms of cyber security threats that you need to avoid, such as ransomware, key logging and phishing. Phishing is where you receive an email from what appears to be a trusted source such as your bank or Amazon asking you for personal information or money. For example, you may … Read more The latest phishing email to avoid
Last Updated on 18th June 2019The Managing Director of a Midlands based IT services company has made the statement that phishing is becoming more sophisticated and has warned that businesses need to start being more vigilant. Phishing is a form of cyber security attack where an individual receives an email from what they believe is a trusted source. The email … Read more IT Expert Warns Phishing is Becoming More Sophisticated
Last Updated on 18th June 2019We’ve talked a lot about phishing. How to spot the signs, how it can affect your business, how easy it is to do. But it’s still this scary term that needs its villainous cloak removing. Things are always less worrying when you know what they look like. In this blog we thought … Read more What does a phishing email look like?
Last Updated on 17th June 2019Phishing is where you receive an email from what appears to be a trusted source asking you for sensitive information, to open an attachment or click on a link. In reality these emails are not from the believed source and are dangerous. They will use your data against you or … Read more Would you get caught out by a phishing email?
Last Updated on 18th June 2019Phishing is one of the biggest issues for cyber security at the moment. Phishing is essentially where you receive emails from someone pretending to be someone else. For example, they could masquerade as your bank or PayPal asking you for personal information. You could also receive a spear phishing email which is more targeted. … Read more 5 Tips to Spot a Phishing Email
Last Updated on 30th June 2020This is our dedicated Working from Home Hub. We will keep this updated with the latest information, hints and tips on how to make working from home as effective as possible. Remote Working Security Use a VPN to protect your data, especially if any staff live in apartment buildings or … Read more Working from Home Hub
Internet hackers have been around almost as along as the internet has. New cyberthreats are always emerging, whether it’s a new virus, ransomware, or a new kind of infection. How can a small business keep up, when there are new cyberthreats emerging on almost a daily basis? What are Cyberthreats? The term “cyberthreat” is usually used … Read more How can a Business Keep Up-to-Date with Emerging Cyberthreats?
As computer users’ knowledge of cyber threats has increased, the threats themselves have become far more sophisticated. Having robust IT security is a number one priority for many businesses to protect both themselves and their customers from such attacks. Increasing regulation over personal data along with an increase in the volume and seriousness of cyber … Read more Top Security Features in Microsoft 365
Making the transition to the cloud can be a great way to enhance your business. However, many organisations are hesitant about making this move due to concerns about data safety and security. If these kinds of worries are holding you back from moving to the cloud, it’s important to know that following best-practice suggestions can … Read more Azure Security Best Practice