No, not an explanation from Evri or AliExpress – not that I expected one from either of them following this article: But a useful advice article from the Google blog: Google shares tips to avoid email, phone, text and Search scams Your Takeaway Two things. Photo by Tara Winstead
Simply Phishing
We all hear so much about phishing attacks that it can become just background noise, rather than a risk and threat to our organisations – I am guilty of adding to noise as I regularly write about the various types of phishing attacks. For instance, I wrote a whole Back-to-Basics …
The edges of physical networks.
I spend a lot of time here talking about hybrid working and working from anywhere, but we have to remember for hybrid working there will be an office somewhere and that office will have cyber security requirements. This is something I am going to looking at in my next Back-to-Basics …
Why you need to protect your organisation’s M365 credentials
We have had to deal with several incidents of Business Email Compromise (BEC), where for one reason or another someone has had their Microsoft credentials compromised and a threat actor has got inside their email. It is a serious problem because threat actors make a lot of money from it. …
Continue reading “Why you need to protect your organisation’s M365 credentials”
Apple Patches
Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …