Blog
Hacked, scammed and deleted: A cybersecurity tale
The security of your business, your accounts and your employees is one of the most important “things” that you need to think of. However, even the most tech savvy, security conscience business can be hit.
This video is a great example of what can happen when your YouTube accounts are hacked, used to scam other people, and then to top it off deleted! Watch as a naked man (it’s all pixelated) runs around trying to beat the hackers, save his business and finally works out what to do.
While entertaining, it is really interesting what the outcomes are, and how they apply to any business. So do you:
- have detailed documentation or disaster recovery plans,
- train your employees in security,
- and make sure that you are using the right tools.
So, ask yourself the question:
Are you doing everything that you can to prevent a breach?
Are you prepared for the worst to happen?
Are you sure? I mean really really sure? ?
If you have a question, need advice, give us call and let’s see how we can help you?

Jig Mehta
Digital Marketing Specialist
Latest cybersecurity articles
- Novel Phishing CampaignThe scammers are at it again and this time that have developed a new way to get round SPAM filters.
- Why SMEs need to up their Cybersecurity gameIn an era where cyber threats are evolving at an unprecedented pace, small and medium-sized enterprises (SMEs) in the UK must prioritise robust IT support with integrated cybersecurity elements to safeguard their operations.
- Why should I get Backup for 365?We recommend backing-up your Microsoft 365 data to another cloud-based server, ensuring that if someone does get past the heavy security that we have set up or there are any internal human errors, we can quickly recover your data and make sure that your organisation keeps on running.
- Cyber Security Awareness monthWell it’s officially October which means its Cyber Security Awareness month and I know what you’re thinking “not another piece of sales material disguised as ‘awareness’ banging on about how AI will revolutionise the security of my business” – absolutely not!
- What on earth is NIS2?Another day, another weird tech acronym! This time it’s related to cybersecurity. NIS2 (Network and Information Security version 2) is the latest EU directive that aims to improve the cybersecurity and resilience of organisations that provide particular services.
- Why your business needs Cyber EssentialsYou’d be forgiven for thinking the end is nigh if you follow the news. Every day we see our streams updated with stories about household names being victims of cyber crime or new ‘critical’ vulnerabilities in applications and services.
- Things you didnt know you needed: Computer LockMake sure you don’t get pranked in the office, whenever you leave you laptop or computer at your desk!
- Whats good got to do with it? Security awareness trainingI recently went to the International Cyber Expo (ICE) for the first time and attended a talk by Dr Jason Nurse. The talk was on the study they conducted on the behaviours and attitudes towards Security Awareness Training.
- QR CodesCyber crooks are always on on the look out for new and effective ways to beat security systems and people to steal. There is a growing trend of criminals using QR codes as part of their phishing campaigns, specifically trying to steal Microsoft credentials.
- Microsoft 365 phishing attackThe cyber criminals are at it again! ? They are now using Microsoft’s Rights Management Services (RMS) to steal credentials!
- Hacked, scammed and deleted: A cybersecurity taleThe most tech savvy, security conscience business can be hit by a security breach. Are you prepared?
- Microsoft Outlook vulnerabilityYou may have seen in the news that Microsoft has identified a particularly nasty Outlook vulnerability.
- Being asked to install or update toolsAre you being asked to install or update one of our tools, are you sure it’s us!?
- Microsoft Authenticator: It is all about the numbersMicrosoft will be implementing a number matching system for Microsoft Authenticator from the 27th February.
- Cybersecurity: The Golden RulesOur Golden Rules are a quick and easy start to protecting your organisation from the cyber criminals.
View all cybersecurity articles >