Insights and Updates

topics of interest delivered fast & to the point ...

IT Insights

Cyber Aware Top Tip #6 – Voice Phishing

What is voice phishing (vishing)? It’s very similar to email phishing, except this scam takes place over the phone.

Voice phishing is the most human of social engineering scams, making it all more believable. Have you seen the advert by Barclays? This is a perfect example of how fraudsters can use simple conversational elements which we’re used to hearing from
trusted establishments and take advantage of that trust.

Why are Cyber Attacks on Universities on the Rise?

Academic institutions are becoming a large target for cyber-attacks. Due to the sheer size of universities, the damage done by cyber criminals can be vast. Not only can it damage reputation, it can have major financial repercussions both instant (breach of regula tion fines) and long term (difficulty securing future funding).

You may think that universities aren’t worth targeting as there are much larger companies who are more appealing at first glance.

Cyber Aware Top Tip #5 – Shoulder Surfers

What is Shoulder Surfing? Sometimes known as tailgating, shoulder surfing is the practice of spying on a user of an electronic device in order to obtain their data or passwords etc. This can be both an online and offline activity, so it’s important to be vigilant to prevent attacks.

Cyber Aware Top Tip #4 – Removeable Media

Although cloud storage is a popular method of holding data, there are still physical products which are used by many people to store and transfer their information. Items like USB sticks, SD cards & external hard drives are good examples of portable devices and we don’t suspect that they’ll be disappearing any time soon due to their versatile nature both inside and outside of the workplace.

Cyber Aware Top Tip #3 – Strong Passwords

Weak passwords are easy for hackers to crack. Security experts say that you should use strong & unique passwords for each of your accounts online. Most people tend to choose a complex password and use it across all of their platforms, however this can leave all of your important information across several accounts vulnerable if a hacker gets hold of said password.

Cyber Aware Top Tip #1 – Email Phishing

The world of technology is forever growing and the rules are always changing. But there are some simple issues which you should make yourself aware of and put into practice. We have created a series of blog posts and posters to help you identify what can cause a cyber problem, and what you can do to prevent this going forward.

Microsoft’s New Azure Security Lab

At the beginning of the week, Microsoft announced a new Azure Security Lab for cybersecurity professionals to take advantage of. So, what’s it all about?

Most importantly, it’s worth knowing that the environment is completely isolated from the main Azure framework.

Don’t Be Left Vulnerable – Windows 7 End of Life

Did you know that come 14th January 2020, Microsoft will be beginning the Windows 7 end of life phase?

The decade old operating system will cease all support come January, meaning Microsoft will no longer be applying security updates to Windows 7 on laptops or desktops, and there is unlikely to be a support team to help should you have encounter problems in the future.