Recognising a Social Engineering Attack

Recognising a Social Engineering Attack

Cyber criminals no longer necessarily hack your accounts or infect your systems to steal your information. These days, they often trick you into making a mistake. This kind of attack is called social engineering, and your common sense is your most powerful defence against it. With this article you will be better equiped for recognising a social engineering attack. Let’s …

Information Security Threats for 2017

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. The Information Security Forum, a global, independent information security body that focuses on cyber security and information risk …

5 Tips on How to Implement an Effective Cyber-Security Strategy for Finance

A Cyber-Security strategy is something that should be on the minds of every company’s executives. The threats to security are becoming increasingly complex, and the ability to stay one step ahead of those threats is more challenging than ever before. Multi IT & Telephony Solutions will now give you 5 tips on how ti implement an effective Cyber-Security strategy for …

Whale Phishing and how to protect yourself from it

Whale phishing is a phishing scam attack that targets the ‘big fish’ in an organisation; the senior executives and other people with access to highly valuable or sensitive information. The scam lures them to share valuable information or transfer funds into an account managed by the cybercriminal. Cybercriminals use spymail to gather important information about their ‘big fish’ before they …

Cyber Security – 10 ways you can educate your employees

Cyber Security and the internet of things has been the highlight of 2016 that has affected millions of people and tens of thousands of businesses.  We’ve all heard about Cryptolocker, Heartbleed and now last week, BASH which have all received global media coverage.  We’ve seen major retailers who have had customer details stolen and we’ve seen Ebay and other global on-line …

How to Test Your Backups

Regularly backing up your business’s files and computer systems is crucial, but it is just as important to test those backups at least once a year. You do not want to find out that your backup images or files are corrupt and thus useless when you are trying to recover from a natural disaster or cyberattack. But how do you …

Apple Provides Critical Update To Address Security Flaws in AirPort

The latest Apple Update for Security have been released by Apple for AirPort Base Station, their wi-fi enabled routers and devices. Affected models are AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n and 802.11ac. In order to ensure the security of your personal information, I would recommend visiting the Apple security page for AirPort Base Station …

Firewall

The Top 5 Reasons Why Your Business Needs a Strong Firewall

In this age of global connectivity, protecting your business’s assets and data is more important than ever. Almost all businesses are connected to the Internet for a wide variety of services. These include email, search, social media, and cloud storage. While much of this traffic is outbound, the fact is that the same Internet connection also allows inbound traffic. That …

Insider Threats: How to Counter Internal Cybersecurity Risks

If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group consists of careless employees who …