A phishing attack in progress
To click or not to click? That is the question … and I’m calling it “Spot the Phish”. According to the 2019 Cyber Security Breaches Survey, phishing is now the most common type of cyber-attack¹. Phishing attacks, in particular email spoofing, account for 90% of data breaches² and in the
Can you pinpoint the weakest link in your organisation’s cyber security infrastructure? According to the FBI, CEO fraud is now a $12 billion scam [1]. Yet some of us remain completely unaware of this style of attack. So what is CEO fraud? Well this scam, often also referred to as
How far would your competitors go to get hold of your intellectual property and trade secrets? Corporate or Industrial Espionage is the term used for the covert (and usually illegal) practice of gathering private and confidential company information, data, trade secrets, business plans, product specifications or formulas using human or
When it comes to safeguarding against a critical data breach, we often focus our primary efforts and investment on protecting networks from external threats.  Statistics show that 73% of data breaches are external attackers [1]. But, as this month’s issue of the Tech Grinch proves, the danger can also be lurking right
Christmas might have been and gone. But what did we risk in the pursuit of those last-minute gifts and January sales bargains? The festive period often leads us into a false sense of security due to our increased desire to purchase and track gift purchases online. We’re often too busy