Cybersecurity: Passwords
Have you ever wondered how to create complex passwords, then this is the tutorial for you!!
Have you ever wondered how to create complex passwords, then this is the tutorial for you!!
Data backup is not exactly top of most people's agenda, however I am going to attempt to pique your interest. So, here we go…
As the CORONApocalypse continues to fade and we all get back to whatever normal is, it's a good opportunity to look back at the changes we have made in the workplace over the last 12-16 months to keep our businesses going and ask ourselves, "is this good?".
We always talk about the technical elements of cybersecurity, what tools, software, and processes that you should use to protect your business. Cybersecurity and data protection (or the failure to truly consider this as an essential forethought) rather than an afterthought is by far of significance importance today.
We’re all aware that we need to be vigilant of our own cyber security and it goes without saying that this should be of paramount importance to any business. The news of the recent Microsoft hack is a stark reminder of just how vital it is to have cyber security monitoring in place.
A live demo of our dark web monitoring tool showing how it works, why it works and how some of the phishes steal data and leak/sell it.
I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they're called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I'll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.
Cybercrime is on the rise and the types of phishing scams are evolving, our ability to identify them has never been more important in both protecting ourselves, but also the organisations that we are part of. There are many types of phishing scams with many different tactics employed, in this article we look at some of the main phishing scams used by the criminals, the intent or nature them and advice on how to deal with them.
Phishing is the most popular form of cyber crime. It’s scam form that has been around for years from the comical prince to the current COVID-19 disguise.
The dark web is term that is used often in the news, when you hear about data breaches and in films used by clandestine groups, but do you really know what it is?
By now I'm sure you're all familiar with the terms "MFA (Multi Factor Authentication), 2FA (Two Factor Authentication) or Strong Authentication" over the last few years, for those of you that aren’t these are largely the same thing (there are some technical & semantical differences but for simplicity let's not get into those) in that they support your traditional Username & Password
Join our Technical Solutions Architect as we discuss cyber security, from why you should care, security tips and working from home.