Our stories

CEO Fraud illustrated by words on a bench saying take a little time to think

Is that really you? CEO Fraud and how to avoid it

Rather misleadingly named, this isn’t fraud by your CEO, but rather by someone pretending to be the CEO (or some other senior staff member in your organisation). It is a particular kind of phishing attack, sometimes called business email compromise, and it works like this… The attacker does a little bit of digging for information about your organisation, possibly using ...
cyber resilience illustrated by boy bouncing on trampoline

Bouncing back: becoming cyber resilient

Resilience is the ability to adapt and recover well in the face of problems. It doesn’t mean that the problems, whatever they are, don’t affect you, but that you can manage the upheaval they’ve caused and ‘bounce back’. For businesses, cyber resilience is the ability to keep the business running—or at least to get back to normal operations quickly—when under ...
people discussing business strategy illustrating cybercrime as a business

Cyber attack as a business

The stereotype of a hacker as a young man alone in his parents’ basement wearing a hoodie is commonplace. Most of the images illustrating articles about hacking conform to this stereotype. As a result, most people outside the information security sector don’t realise that hacking can be big business, and runs in a similar way to most businesses you see ...
chess pieces (pawns, king and queen) illustrating senior leadership and tone from the top

Setting the Security Tone from the Top

Whatever the size of your organisation, your culture and the way that people behave, is probably set by the people at the top. This is as true for the organisation’s attitude to cyber security as it is for its ethics. There is a tendency to assume that security is about technology, but it is important to include people and the ...

QR codes: be careful of links in disguise

QR codes have become an increasingly common sight since the beginning of the pandemic—they are a useful ‘no physical contact’ method of doing almost anything:
  • Buying groceries
  • Checking in at locations
  • Ordering food at a restaurant
  • Making payments and using discount vouchers
  • Downloading apps
  • Providing additional information about an item, a location—potentially in a variety of languages too
  • Replacing hotel in-room magazines
  • Verification of documents such as ...
target hit by arrow

Professional firms targeted by cyber-attack gang

Ever searched online for a free template, to save time reinventing the wheel? We’ve probably all done it, even if just for an invitation template. But there are dangers, particularly for professional firms, as recently reported in Threatpost. Cyber attackers have hijacked some websites offering business agreement templates for professionals, such as; solicitors and accountants. Needing to create an agreement, ...