DMARC – As an agency, it is time to act.
Thursday, 15 February 2024
Email providers like Google, Yahoo, and Apple are all beginning a process where they start to block bulk email senders if they don’t have DMARC in place. Simply put, that will mean that your and your client’s emails will not make it to their intended destination. In time, this rule will apply to all emails
- Published in Cyber Security
No Comments
Staying Alert: Combating Social Engineering and Phishing Attacks
Tuesday, 23 January 2024
In our digitally connected world, cyber threats pose a significant risk to both individuals and organizations. Among these threats, social engineering stands out as a cunning tactic where attackers exploit human psychology to gain sensitive information or compromise security. Phishing attempts, a common manifestation of social engineering, are becoming increasingly sophisticated, often impersonating trusted colleagues,
- Published in Cyber Security
5 ways your employees can compromise your cyber security in 2022
Tuesday, 02 August 2022
More than 80% of UK businesses faced a cyberattack over the last year. Many of these attacks were caused by employees. It’s usually unintentional – the employees might not be well trained in cyber-security protocols, or worse yet, they may not be following that training. Here are 5 ways your employees could be a risk to your business’s cybersecurity.
- Published in Cyber Security
How to Prevent Ransomware Attacks
Tuesday, 26 July 2022
Ransomware attacks are becoming a popular method of cybercrime. In 2021 alone, there were a reported 500 million ransomware attacks. Preventing these kind of attacks on your business is critical. Here we will discuss what ransomware is, how to prevent these attacks and what to do if you do become the victim of it. What
- Published in Cyber Security
Insider Threats
Monday, 20 June 2022
Cybersecurity infrastructure is vital for your business continuity. We have talked in previous blog articles about some of the best ways to keep your business safe from outside attacks. It is, however, important to remember that not all threats or attacks come from the outside. What are Insider Threats Insider threats come from within the
- Published in Cyber Security
Penetration Testing
Tuesday, 14 June 2022
If you only find out where your security weaknesses are after they’ve been exploited, you’ve found out too late. The best cyber security strategy is a proactive one, and a hallmark of proactive cyber security is the use of penetration testing. What is Penetration Testing? A penetration test is an authorized attack on your business’s IT
- Published in Cyber Security