Our stories

Email attacks: is your inbox flooded?

Is your inbox filling up with thousands of messages more than usual? Perhaps unsolicited subscription confirmation requests, or maybe simple text-only messages about nothing very much? Whatever the contents of the messages, be aware that this isn’t just a nuisance (which it certainly is) but that you may be under attack. These thousands of emails are a distraction, filling up ...

Who else is reading your mail?

Auto-forwarding of emails can be very useful, for instance, if one of your staff leaves, you might want to auto-forward their emails to your inbox for a few months, just to make sure that you don’t miss anything important. Or you might decide to forward all mail that comes to ‘sales@’ or ‘info@’ to your own email address, so that ...
no need for cyber security - person typing on an old-fashioned typewriter

What kind of business doesn’t need cyber security?

What kind of business would have no need for cyber security? A business that didn’t have any cyber security risks, would have to be a business that was completely offline. It would have no website, and no social media for marketing. Presumably they would find business by word of mouth only, or by leaflet-drop around very specific areas: probably a ...
CEO Fraud illustrated by words on a bench saying take a little time to think

Is that really you? CEO Fraud and how to avoid it

Rather misleadingly named, this isn’t fraud by your CEO, but rather by someone pretending to be the CEO (or some other senior staff member in your organisation). It is a particular kind of phishing attack, sometimes called business email compromise, and it works like this… The attacker does a little bit of digging for information about your organisation, possibly using ...
cyber resilience illustrated by boy bouncing on trampoline

Bouncing back: becoming cyber resilient

Resilience is the ability to adapt and recover well in the face of problems. It doesn’t mean that the problems, whatever they are, don’t affect you, but that you can manage the upheaval they’ve caused and ‘bounce back’. For businesses, cyber resilience is the ability to keep the business running—or at least to get back to normal operations quickly—when under ...
people discussing business strategy illustrating cybercrime as a business

Cyber attack as a business

The stereotype of a hacker as a young man alone in his parents’ basement wearing a hoodie is commonplace. Most of the images illustrating articles about hacking conform to this stereotype. As a result, most people outside the information security sector don’t realise that hacking can be big business, and runs in a similar way to most businesses you see ...