Select Page

Security is not as straightforward as it was in the past. Every day, we see new risks to our network’s cyber security.

The quantities of cyber attacks as well as the sophistication of such attacks are both expanding, posing a very serious risk to enterprises. The number of cyber threats targeting businesses is also growing. Have you established cyber resilience or web security?

The days are long gone when a virus writer would create infections for “fun,” political, or anti-establishment reasons; these days, it is a large business; whether people are paying to have their data decrypted or if they have transferred money to a fraudster – and this takes place every day.

Technology and software can be utilized to reduce the danger, but it will never be eliminated entirely, mostly because of the behaviours of humans and the social engineering that they engage in. The vast majority of the more significant frauds are carried out in this manner. Criminals are the ones who start frauds, but victims almost always end up aiding the perpetrators. Consider the action that you are being requested to carry out.

If someone asks you to verify information by sending money, opening a file, sending money, or clicking on a link, STOP WHAT YOU’RE DOING AND THINK ABOUT IT.

Our Recommendations Regarding Cybersecurity:

In order to prevent you from falling prey to online fraud or other forms of cybercrime;

Protection for Office 365 users:

Office 365 is an incredible piece of software for businesses; in fact, the vast majority of our customers are already utilising it to provide email services, in addition to collaborative working, unified communications, and file management. Because it is so effective, it has emerged as the de facto standard for the provision of email.

Because of its widespread adoption, Office 365 has been a primary focus for con artists operating online. The bad news is that “out of the box,” Office 365 contains certain known vulnerabilities. The good news is that these vulnerabilities can be patched. The good news is that it can be “hardened,” which means that it can be made significantly more difficult for a con artist to take advantage of.

Avoid clicking on any links:

If you did not anticipate receiving an email from someone containing a link, you should not click on the link in the email. Simply clicking on a link can set off a chain reaction of unwelcome events, from ransomware, which encrypts all of your data, to viruses that allow criminals to gain access to your environment through a back door.

Be on the lookout for emails that have ominous sounding subject lines, such as “Letter of Resignation” or “Notice of Redundancy,” since these are crafted to encourage you to take action before you have the chance to ponder. Check out the related links. If you move your mouse cursor over a link WITHOUT CLICKING IT, you will see the exact web address that you will be directed to when you follow that link.

DO NOT CLICK ON IT if the phrase does not match the context.

Avoid Disclosing Any Private Information At All Costs:

Under no circumstances should you answer emails or phone calls asking for confidential information. Your cyber security analyst would advise you the same.

Swindlers can easily find out who works at a company (all of the information is on Companies House, LinkedIn, Facebook, or any other number of social media platforms), and once they have this information, they can use it to their advantage by pretending to be an employee, director, or accountant in order to harvest information.

They are capable of making a strong case. This information will be used to facilitate an attempt to steal money from you through fraudulent means.

Under No Circumstances Should A Payment Be Made Based On An Email:

Everyone needs to have their finances under rigorous control. It is highly possible that your email address can be found in a database someplace. Scammers have access to your personal information, including your name, email address, and sometimes even your passwords, if you have ever submitted it through an internet form (which you have).

Scammers are able to access the information you submitted to an online service if you are registered with that site and the service has experienced a security breach (such as LinkedIn, Adobe, Dropbox, and the list goes on and on…). This includes your password.

Swindles involving money are getting more sophisticated all the time. It is not solely about malicious software or computer viruses. Have a conversation with the individual you are paying before making an unexpected payment, updating your bank details, or paying a new supplier.

NEVER EVER PUT YOUR TRUST IN AN EMAIL THAT REQUESTS PAYMENT FROM YOU.

Passwords:

Do not save a file on your computer or in your email that contains all of your passwords; if you are hacked, you have just given a criminal access to everything. It’s important to note that you shouldn’t scribble them down and keep them unlocked on your desk or top drawer. A password is important to a criminal regardless of how it was obtained.

Your password should be at least eight characters long. Instead, use a sentence; it’s easier to remember and more secure (e.g. “MyfirstcarregistrationwasKY60RXY”).

Also, don’t reuse passwords… and if possible, use Multi-Factor Authentication (MFA) – something you know and something you have.

Don’t Dismiss Your Computer’s Warnings:

When you have antivirus software installed, Windows will occasionally notify you that there is a problem. If in doubt, contact us about the notice, but don’t disregard it; it’s designed to alert you to potential problems.

If a file contains a macro, Microsoft Office will notify you. Macro’s should only be enabled if you are confident in the document’s source, as macros can contain viruses.

Antivirus prompts should only alert you to risks that have been discovered. If the prompt or security product is unfamiliar to you, or if it is attempting to send you to a link, do not proceed and contact us.