Email Phishing Scams Are More Sophisticated & Prevalent Than Ever

Phishing email scams featured image

According to Verizon’s 2018 Data Breach Investigations Report, 92.4% of malware is delivered by email. Up until now, phishing emails have been easy to spot because they come from suspicious email addresses and include poor grammar and formatting – when you think of a phishing scam, you probably picture one of those poorly worded emails

What Is Application Whitelisting? How It Can Fortify Your Business Against Ransomware

Application Whitelisting image shows an unlocked padlock

Application Whitelisting has been listed by the Australian Signals Directorate as the most effective strategy in mitigating cyber security threats. Despite this, organisations are often oblivious to the value of application whitelisting, or reticent to go through the process of adopting it. While it may not be a panacea to protecting your digital assets, well-executed application

Companies are Facilitating their Own Cyber Blackmail, report finds

Remove ransomware and avoid blackmail

Ransomware attacks have quadrupled in the past year because companies like yours are paying up! A report released by insurance underwriter Beazley last week found the lure of an easy pay-day, combined with the ease of buying easy-to-operate ransomware kits, had made the attacks a real growth industry for cyber-criminals. “From what we are seeing,

It’s Time to Embrace the No. 1 ASD Strategy to Mitigate Cyber Intrusion

Application Whitelisting Security company

Since 2013, the Australian Signals Directorate has published a list of 4 critical strategies to adopt if you want to mitigate 85% of the risk from cyberattacks. Do you know what they are? No. 2 on the list is “Patch Applications”. Apply security patches to prevent criminals from entering your network through known flaws that

Humans make the best attack vector

Who? Me? - a businessman feigns surprise

Who?  Me? As a Managed IT Service provider looking at the state of affairs in multi-stage chained attacks we can say this: if you want to be an effective hacker, take a persuasive writing course. That’s also the lesson delivered in a report last week by US-based Proofpoint, a leading Security-as-a-service vendor shows that automated