Mail

A category showcasing all the types and advantages of Mail security

Social engineering

Social engineering and cyber security

Social engineering is the ability to manipulate people into wilfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about …

Social engineering and cyber security Read More »

Ransomware

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible …

Ransomware adopting self-replication Read More »

malware

8 signs your computer might be infected with malware

Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them. So, even if you use anti-malware software, your computer might …

8 signs your computer might be infected with malware Read More »

Information Security Threats for 2017

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. The Information Security Forum, a global, independent information security body that focuses on …

Information Security Threats for 2017 Read More »

Whale Phishing and how to protect yourself from it

Whale phishing is a phishing scam attack that targets the ‘big fish’ in an organisation; the senior executives and other people with access to highly valuable or sensitive information. The scam lures them to share valuable information or transfer funds into an account managed by the cybercriminal. Cybercriminals use spymail to gather important information about …

Whale Phishing and how to protect yourself from it Read More »

Ransomware attacks – how to protect your business

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016. There was a 30 percent increase in the number of ransomware attacks in the first …

Ransomware attacks – how to protect your business Read More »

Ransomware warning

Computer users are advised not to click on links or open attachments in uninvited or unexpected emails and be wary about the websites they visit as security researchers identify hazardous new versions of ransomware. They should keep regular backups of important files and store the backups in a location away from a network. Ransomware is …

Ransomware warning Read More »

Insider Threats: How to Counter Internal Cybersecurity Risks

If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group …

Insider Threats: How to Counter Internal Cybersecurity Risks Read More »

iTunes Scam Text Messages Spreading Malware

The latest iTunes Scam has been reported. Malicious individuals are reportedly sending scam text messages claiming to be from Apple’s music service iTunes to a large number of people. The message is believed to claim the recipient’s iTunes account has been frozen and asks them to click on a link to ‘validate their [iTunes] account’. …

iTunes Scam Text Messages Spreading Malware Read More »

Scroll to Top