If you’ve read this blog before, you already know security is paramount to the success of any small business. Multi IT & Telephony Solutions is BIG on security and we have compiled five tips to avoid a security breach. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organisations …
Young workers are more gullible to tech scams
Young workers are more gullible to tech scams, well that is what the latest studies show. The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on …
Social engineering and cyber security
Social engineering is the ability to manipulate people into wilfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening. Avoiding it …
Ransomware adopting self-replication
Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection. Ransomware, the …
8 signs your computer might be infected with malware
Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them. So, even if you use anti-malware software, your computer might still get infected. It will …
Email Security Feature for O365
While you can take many security precautions to protect your organisation, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new email security feature for Outlook, but only if you’re an Office 365 user. Here’s how it can help your business. …
Information Security Threats for 2017
Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. The Information Security Forum, a global, independent information security body that focuses on cyber security and information risk …
Whale Phishing and how to protect yourself from it
Whale phishing is a phishing scam attack that targets the ‘big fish’ in an organisation; the senior executives and other people with access to highly valuable or sensitive information. The scam lures them to share valuable information or transfer funds into an account managed by the cybercriminal. Cybercriminals use spymail to gather important information about their ‘big fish’ before they …
Ransomware attacks – how to protect your business
The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016. There was a 30 percent increase in the number of ransomware attacks in the first quarter of 2016 compared to …
Ransomware warning
Computer users are advised not to click on links or open attachments in uninvited or unexpected emails and be wary about the websites they visit as security researchers identify hazardous new versions of ransomware. They should keep regular backups of important files and store the backups in a location away from a network. Ransomware is a type of malware that …
How to Avoid Creating Weak Passwords
You have likely heard that using strong passwords is an integral part of protecting a company’s data. But do you know what makes a password strong or weak? To find out, here is a quick weak passwords quiz: Take a look at the list of passwords below. (The quotes are not part of the passwords.) Which of the following are …
Insider Threats: How to Counter Internal Cybersecurity Risks
If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group consists of careless employees who …