Blog
Hacked, scammed and deleted: A cybersecurity tale
The security of your business, your accounts and your employees is one of the most important “things” that you need to think of. However, even the most tech savvy, security conscience business can be hit.
This video is a great example of what can happen when your YouTube accounts are hacked, used to scam other people, and then to top it off deleted! Watch as a naked man (it’s all pixelated) runs around trying to beat the hackers, save his business and finally works out what to do.
While entertaining, it is really interesting what the outcomes are, and how they apply to any business. So do you:
- have detailed documentation or disaster recovery plans,
- train your employees in security,
- and make sure that you are using the right tools.
So, ask yourself the question:
Are you doing everything that you can to prevent a breach?
Are you prepared for the worst to happen?
Are you sure? I mean really really sure? ?
If you have a question, need advice, give us call and let’s see how we can help you?

Jig Mehta
Digital Marketing Specialist
Latest cybersecurity articles
- How to identify AI created content and its cybersecurity implicationsArtificial Intelligence (AI) has transformed content creation, enabling businesses and individuals to produce blogs, images, emails, and social media posts at scale. While this technology offers efficiency and creativity, it also introduces challenges.
- Your team members are helping the hackers!Yes, you read that right. 😲 The biggest threat to your organisation’s cybersecurity might not be a shadowy figure in a hoodie halfway across the world, it could be sitting right next to you in the office.
- Novel Phishing CampaignThe scammers are at it again and this time that have developed a new way to get round SPAM filters.
- Why SMEs need to up their Cybersecurity gameIn an era where cyber threats are evolving at an unprecedented pace, small and medium-sized enterprises (SMEs) in the UK must prioritise robust IT support with integrated cybersecurity elements to safeguard their operations.
- Why should I get Backup for 365?We recommend backing-up your Microsoft 365 data to another cloud-based server, ensuring that if someone does get past the heavy security that we have set up or there are any internal human errors, we can quickly recover your data and make sure that your organisation keeps on running.
- Cyber Security Awareness monthWell it’s officially October which means its Cyber Security Awareness month and I know what you’re thinking “not another piece of sales material disguised as ‘awareness’ banging on about how AI will revolutionise the security of my business” – absolutely not!
- What on earth is NIS2?Another day, another weird tech acronym! This time it’s related to cybersecurity. NIS2 (Network and Information Security version 2) is the latest EU directive that aims to improve the cybersecurity and resilience of organisations that provide particular services.
- Why your business needs Cyber EssentialsYou’d be forgiven for thinking the end is nigh if you follow the news. Every day we see our streams updated with stories about household names being victims of cyber crime or new ‘critical’ vulnerabilities in applications and services.
- Things you didnt know you needed: Computer LockMake sure you don’t get pranked in the office, whenever you leave you laptop or computer at your desk!
- Whats good got to do with it? Security awareness trainingI recently went to the International Cyber Expo (ICE) for the first time and attended a talk by Dr Jason Nurse. The talk was on the study they conducted on the behaviours and attitudes towards Security Awareness Training.
- QR CodesCyber crooks are always on on the look out for new and effective ways to beat security systems and people to steal. There is a growing trend of criminals using QR codes as part of their phishing campaigns, specifically trying to steal Microsoft credentials.
- Microsoft 365 phishing attackThe cyber criminals are at it again! ? They are now using Microsoft’s Rights Management Services (RMS) to steal credentials!
- Hacked, scammed and deleted: A cybersecurity taleThe most tech savvy, security conscience business can be hit by a security breach.Are you prepared?
- Microsoft Outlook vulnerabilityYou may have seen in the news that Microsoft has identified a particularly nasty Outlook vulnerability.
- Being asked to install or update toolsAre you being asked to install or update one of our tools, are you sure it’s us!?
View all cybersecurity articles >