How Not to Acknowledge a Data Breach

Posted on 14th May 2019

I’m not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally it seems necessary to publish such accounts when companies respond to a breach report in such a way that it’s crystal clear that they wouldn’t know what to do with a breach if it bit them in the nose, let alone festered unmolested in some dark corner of their operations.

Read more

Small Business Cyber Security: The Ostrich Effect

Posted on 31st March 2019

Some small business owners will realize I’m describing them after they read this blog, but then those same c-level guys won’t see it and even if they do, they won’t read it, because they don’t want to know.

Read more

The Psychology of Falling for a Phishing Email

Posted on 27th March 2019

Phishing is a cybercrime that has been around for many years, where targets are sent malicious emails claiming to be from a legitimate individual or organization to trick them into disclosing their sensitive information.

Read more

51% of Small Business Leaders Think Their Business Isn’t a Target for Cybercriminals

Posted on 24th March 2019

Small businesses are often thought to be a forgotten entity when it comes to cybercrime. On the surface, it seems like a fair assumption that hackers wouldn’t target small businesses when there are large enterprises with much greater assets.

Read more

Business Email Compromise Scams – Here to Stay

Posted on 20th March 2019

Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much success in exploiting human vulnerabilities through BEC scams that their frequencies have been dramatically increasing.

Read more

Phishing Scams: A Growing Threat for Small Businesses

Posted on 17th March 2019

In a recent warning, the Federal Trade Commission (FTC) has cautioned consumers and small businesses about the continuing and growing threat of phishing scams.

Read more

The Great Pyramids You Don’t Want to Visit

Posted on 13th March 2019

Have you ever been on the other end of one of these conversations? Congratulations, you’re now likely part of the crowd who has been pitched to participate in a pyramid scheme.

Read more

Business Identity Theft Is on the Rise

Posted on 10th March 2019

Identity theft is not a new crime, in fact, criminals have been altering and improving their techniques to capture and use stolen information for years.

Read more

Ransomware is Alive and Well – Here Are 10 Tips to Help Protect Your Organization

Posted on 6th March 2019

Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months.

Read more

Shining Light on the Dark Web

Posted on 3rd March 2019

We’ve all heard of the Dark Web. The infamous private corners of the internet that are only accessible through special software that mask your IP address

Read more

Join our Newsletter

Get updates and the latest scoop in your inbox