Phishing Attack Trends to Be Aware of in 2022

Phishing Attack Trends

Phishing remains one of the biggest dangers to every business’s security as it is the main delivery method for all types of cyberattacks. Cisco’s 2021 Cybersecurity threat trends report shows that at least one person clicked a phishing link in around 86% of organizations and suggests that phishing accounts for around 90% of data breaches. Continue reading

The Power of a Password Manager

Password Managers

All of us like to think that we are unique and that thinking extends to our passwords too, right? We are special and distinct, and no one could guess our specific combination of letters, numbers and symbols. Well, did you know that it is very easy for computers to very quickly determine passwords. So, using a password manager is a great move, as you can securely store your passwords in an easily retrievable way. But is your master password for your password manager secure, original and long enough? Continue reading

How to Spot Email Spoofing

Email Spoofing

Like me, you are probably overwhelmed with the number of emails you receive each day and you could be excused for not looking at them all closely. But not taking this seriously can be a huge risk to your business. Keep reading to learn more about email spoofing and how you can avoid it. Continue reading

Prepare Your IT for the Holiday Season

Christmas Tech

Don’t be the office Grinch this Christmas, prepare your technology and systems to reduce downtime risk, avoid disrupting your customers’ holiday season and your employees’ holiday fun. Continue reading

5 Security Vulnerabilities You Need To Fix ASAP

Cyber Security

Cybercriminals take advantage of various vulnerabilities in your companies IT systems and fixing them before the worst happens is crucial to protecting your business and your reputation. Continue reading

What Not To Do On A Work Computer

What not to do on a work computer

This article shares things employees should avoid doing on work computers, whether they are working remotely or in the office. These tips help both you and your work control security and data access. Continue reading

Why You Shouldn’t Use SMS as your 2FA

2FA / MFA Issues

Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It has become the norm and if you are not doing this for all your online accounts then you should start straight away (check out our article on Why 2FA is Important). As with most things security wise, hackers have figured out how to get around the SMS code, too. This article shows you how they do it and how to stay safe. Continue reading

3 Ways You Can Get Infected With Ransomware

What to do if you are hit by ransomware

There’s been a lot in the news over the last few weeks about ransomware attacks. As the media can give people the wrong impression let me clear up some things for you. Continue reading

What to Do If You Get Hit With Ransomware

What to do if you are hit by ransomware

If you get hit with ransomware there will be a number of indications, including:

  • A screen telling you that your business files are encrypted.
  • You can’t open any of your documents.
  • Your files may have a weird extension of different icon.
  • there will be instructions for how to pay up to recover your files.

This blog article details a number of steps you can take instead of paying the ransom straight away. Continue reading