Social engineering

Social engineering and cyber security

Social engineering is the ability to manipulate people into wilfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening. Avoiding it …

Social engineering scams

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken centre stage. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. Without knowing the most common social engineering exploits, your …

Data

Do you speak “Data”?

Quick, what’s the most important thing about your business’s precious data? Besides knowing how to back it up properly and protect it from catastrophic loss, how about understanding all the lingo used to describe it? The term “big data” – in reference to large, complex data sets – is a well-known buzzword these days, but a slew of new “data” …

simple security measures

5 manageable and simple security measures

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help. And when that’s the case, …

malware

8 signs your computer might be infected with malware

Anti-malware software plays an important role in the battle against cybercrime. However, it is not infallible. Cybercriminals are constantly releasing new malware programs or variants of existing ones, and it takes a while for anti-malware software companies to update their products to defend against them. So, even if you use anti-malware software, your computer might still get infected. It will …

Recognising a Social Engineering Attack

Recognising a Social Engineering Attack

Cyber criminals no longer necessarily hack your accounts or infect your systems to steal your information. These days, they often trick you into making a mistake. This kind of attack is called social engineering, and your common sense is your most powerful defence against it. With this article you will be better equiped for recognising a social engineering attack. Let’s …

Information Security Threats for 2017

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. The Information Security Forum, a global, independent information security body that focuses on cyber security and information risk …

5 Tips on How to Implement an Effective Cyber-Security Strategy for Finance

A Cyber-Security strategy is something that should be on the minds of every company’s executives. The threats to security are becoming increasingly complex, and the ability to stay one step ahead of those threats is more challenging than ever before. Multi IT & Telephony Solutions will now give you 5 tips on how ti implement an effective Cyber-Security strategy for …

Whale Phishing and how to protect yourself from it

Whale phishing is a phishing scam attack that targets the ‘big fish’ in an organisation; the senior executives and other people with access to highly valuable or sensitive information. The scam lures them to share valuable information or transfer funds into an account managed by the cybercriminal. Cybercriminals use spymail to gather important information about their ‘big fish’ before they …