cybersecurity Tag

[et_pb_section bb_built="1" admin_label="Section" fullwidth="off" specialty="off" transparent_background="off" allow_player_pause="off" inner_shadow="off" parallax="on" parallax_method="off" padding_mobile="on" make_fullwidth="off" use_custom_width="off" width_unit="on" make_equal="off" use_custom_gutter="off" custom_padding="0px||0px|"][et_pb_row admin_label="Row" make_fullwidth="off" use_custom_width="off" width_unit="on" use_custom_gutter="off" allow_player_pause="off" parallax="off" parallax_method="off" make_equal="off" parallax_1="off" parallax_method_1="off" bg_img_2="https://www.urbannetwork.co.uk/wp-content/uploads/2017/02/Jackson-Stops-and-Staff-nationwide-estate-agents-UK-map-JSS.jpg" parallax_2="off" parallax_method_2="off"][et_pb_column type="1_3"][et_pb_blurb admin_label="Blurb" url_new_window="off" use_icon="off" font_icon="%%24%%" icon_color="#e74c3c" use_circle="off" circle_color="#7EBEC5" use_circle_border="off" circle_border_color="#7EBEC5" icon_placement="top" animation="top" background_layout="light" text_orientation="left"...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" use_border_color="off" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.100"] Security breached are costly and rarely a day goes without you seeing a headline about a new data breach. You might wonder how best to keep yourself safe online. One simple advice:...

[et_pb_section bb_built="1" fullwidth="off" specialty="off"][et_pb_row background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] A strong password is your first defence against hackers and cyber criminals. This month is Cyber Security Awareness Month, we will share simple tips on how to create secure password...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] In 2015, we observed an increase of macro-based malware along with the spike in spam volume. The majority of the macro-based attacks often start with spammed messages containing attachments such...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] There are numerous ways to spot a fake email. The list below is not exhaustive but covers most common types of phishing attempts. [/et_pb_text][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] The message contains poor spelling and grammar [/et_pb_text][et_pb_text admin_label="Text"...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] The World Wide Web is a wonderful thing, never has it been so easy to find information, research your favourite topics or shop from the comfort of your armchair; it’s...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] What is Malvertising? [/et_pb_text][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] Malvertising, short for malicious online advertising, is a combination that describes the cybercrime of using advertising on websites to proliferate...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] In some cases, cybercriminals may have managed to gain access to systems belonging to somebody that you know and trust or potentially they have spoofed their address (sending with the...

[et_pb_section admin_label="section" transparent_background="off" allow_player_pause="off" inner_shadow="off" parallax="off" parallax_method="off" padding_mobile="off" make_fullwidth="off" use_custom_width="off" width_unit="on" make_equal="off" use_custom_gutter="off"][et_pb_row admin_label="row" make_fullwidth="off" use_custom_width="off" width_unit="on" use_custom_gutter="off" padding_mobile="on" allow_player_pause="off" parallax="off" parallax_method="off" make_equal="off" parallax_1="off" parallax_method_1="off" column_padding_mobile="on"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] What is Phone Phishing, Voice Phising or Vishing? [/et_pb_text][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff"...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] What is Spear Phishing? [/et_pb_text][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] Spear Phishing is a form of Social Engineering. It may be defined as ‘highly targeted phishing aimed at specific...