Email attacks: is your inbox flooded?
Is your inbox filling up with thousands of messages more than usual? Perhaps unsolicited subscription confirmation requests, or maybe simple text-only messages about nothing very much? Whatever the contents of the messages, be aware that this isn’t just a nuisance (which it certainly is) but that you may be under attack. These thousands of emails are a distraction, filling up ...
Who else is reading your mail?
Auto-forwarding of emails can be very useful, for instance, if one of your staff leaves, you might want to auto-forward their emails to your inbox for a few months, just to make sure that you don’t miss anything important. Or you might decide to forward all mail that comes to ‘sales@’ or ‘info@’ to your own email address, so that ...
What kind of business doesn’t need cyber security?
What kind of business would have no need for cyber security? A business that didn’t have any cyber security risks, would have to be a business that was completely offline. It would have no website, and no social media for marketing. Presumably they would find business by word of mouth only, or by leaflet-drop around very specific areas: probably a ...
Is that really you? CEO Fraud and how to avoid it
Rather misleadingly named, this isn’t fraud by your CEO, but rather by someone pretending to be the CEO (or some other senior staff member in your organisation). It is a particular kind of phishing attack, sometimes called business email compromise, and it works like this… The attacker does a little bit of digging for information about your organisation, possibly using ...
Bouncing back: becoming cyber resilient
Resilience is the ability to adapt and recover well in the face of problems. It doesn’t mean that the problems, whatever they are, don’t affect you, but that you can manage the upheaval they’ve caused and ‘bounce back’. For businesses, cyber resilience is the ability to keep the business running—or at least to get back to normal operations quickly—when under ...
Cyber attack as a business
The stereotype of a hacker as a young man alone in his parents’ basement wearing a hoodie is commonplace. Most of the images illustrating articles about hacking conform to this stereotype. As a result, most people outside the information security sector don’t realise that hacking can be big business, and runs in a similar way to most businesses you see ...