Emails

Phishing risk- Email and Web

Phishing risk- Email and Web

Businesses are responding to the latest vulnerabilities in their email and website security by investing in employee training. Businesses are continuously becoming victims of phishing emails through poor judgment by their employees and the lack of training to have the ability to recognise these malicious emails. In fact, phishing emails and poor website security are amongst some of the biggest sources of cyber attacks.

4 Ways To Up Your Email Security

4 Ways To Up Your Email Security

Emailing is one of the most common ways that we now communicate with each other. Not only that but emails are used for a number of things such as transactions, online shopping, account creation, verification, job applications and more.

Reducing human error in cyber security

Reducing human error in cyber security

When we reference human error in regard to cyber security, we are talking about individuals that cause or allow a security breach to happen as a result of making an unintentional action or failing to take the necessary precautions.

Microsoft- Exchange Online Mailbox Incident

Microsoft- Exchange Online Mailbox Incident

Microsoft have yet recently announced "Service Degradation" on Exchange Online- a hosted email service for businesses. This follows closely after the issues with Microsoft 365 and Teams back in January. I think we can all agree that incidents and crashes like these...

Top email threats of 2022

Top email threats of 2022

Malware infected emails take the top spot for the most popular email threats of 2022. The cyber criminals would pose as an internal employee of the targeted business, and tempt the recipient to either download a file or click on a click that has been infected by malware.

Phishing attacks – successful on businesses?

Phishing attacks – successful on businesses?

Phishing is a common and widely used form of cyber attack with the intent to steal, damage and encrypt user data. This form of cyber attack usually happens through email communication where the cyber attacker attempts to trick a user into clicking on an infected link that will download malware onto their device. Once the malware has been released, the attacker is now able to access all of the user’s data.