Discover the top 7 employee cyber security risks that could leave your business vulnerable. Learn how to strengthen your defences and protect your data.
Continue readingHow Do I Check if I Have Malware? – Beware of Sneaky Tactics
Wondering “How do I check if I have malware?” Watch out for pop-ups or password pages, and avoid entering login details on suspicious sites.
Continue readingAre your Google Chrome extensions safe, or are you putting your business at a huge risk?
Protect your business from malware by learning how to safely use Google Chrome extensions with our expert tips and advice.
Continue readingHow to prevent ransomware attacks and protect your business [+Free 5 Step Cyber Attack Recovery Guide].
Learn how to prevent ransomware attacks with easy tips to protect your business from cyber threats & download our cyber attack recovery guide.
Continue readingSimple Cyber Security Tips You Can’t Afford to Ignore
Learn a few simple cyber security tips like encryption, MFA, and password managers to protect your data and avoid financial loss.
Continue readingEmbrace new tools like facial recognition technology
Biometrics, using unique traits like fingerprints and facial recognition technology, offer superior security and convenience. Here’s how it works.
Continue readingNever use your weak browser password manager, and five simple reasons why.
security. To protect yourself against cyber threats like hacking and data theft, it is essential that you avoid using your browser’s built-in password manager whenever possible.
Here’s why…
Continue readingHow To Make A Super Secure Password
Passwords are the only thing standing between hackers and all your personal or business files, documents, photos and deepest, darkest secrets.
Is isn’t difficult for accounts to be hacked and passwords to be changed or attained when your passwords are weak.
There is software floating about that super techy guys know how to work, which decodes passwords in seconds and gives access to anything from an Instagram account to a CEO’s personal email. It works a bit like cracking a safe – in theory it’s a good, ‘secure’ idea but it’s actually really easy to break into.
This means you have to up your password game to stay protected. A measly name or street road, password followed by a number won’t cut it anymore.
TIPS TO SECURE YOUR ACCOUNTS:
1. Make sure you don’t have the same password for all your accounts.
2. Select a standard of 8 characters, 1 capital letter and 1 special character.
3. No common words or things associated to you personally (date of birth, pets name, street name)
4. Download a password manager and two-factor authentication app such as Last Pass. This way if a hacker does gain access to your password they won’t be able to log in without a one-time generated code.
5. DON’T MAKE YOUR PASSWORD, ‘password’!
What is Phishing?
Phishing is a fraudulent online method of coaxing sensitive information such as; usernames, passwords, credit card details, medical history, etc. through the use of emails, phone or text.
These emails are designed to seem legitimate and are sent by scammers posing as real people or companies that that person does business with.
In actual fact, they are from attackers looking to infiltrate your system or attain a payment or your credentials. It could include a prompt in the form of a link to a website or a simple request of payment details.
TIPS TO AVOID SCAMS:
1. If the email is from a sender you don’t recognise – DO NOT OPEN IT.
2. If the email is from a sender you DO recognise, but the subject line and message are regarding an issue unknown to you or asking for a payment, always call the person to CONFIRM the details.
3. Double check the sender’s email address – often scammers will misspell or add numbers to a familiar email to make it believable. E.g. if the real email is ‘[email protected]’, the scammer might use ‘[email protected]’
4. If the email isn’t addressed to anyone – be suspicious. If payments are being requested, it should at least greet your personally (Hi John). If the email goes right into requesting funds without any niceties or conversation topics familiar to you and that person, it could be a sign of phishing.
5. Some blackmail hackers will use scare tactics to get you to make a payment. This could be threats such as; ‘We will release your search history to your colleagues’ or ‘We will delete your database’, etc. followed by, ‘unless you make a payment to this account’. Don’t believe it and make your IT department aware.
6. Change your password regularly [See our post about how to create a secure password].










