So most organisations use Microsoft Office in some way. Even if it they do not use it, someone will email them a Word or Excel document. You cannot avoid it – even on a Mac or Linux computer. That makes it a juicy target for threat actors – there are …
How to evade reputation based email cyber security
A very effective way to reduce phishing email is to enforce only receiving email from reputable email services. If you have not heard of this type of email protection then it is time to get in contact with us. However if the threat actors have a method of hijacking one …
Continue reading “How to evade reputation based email cyber security”
Time to think about more than just anti-virus
In a break from our series about cyber security risk, I wrote an article this week looking at why an organisation needs more than just anti-virus, if they want the best security they can afford… Anti-virus – This is why you need more and better… …starting at just £10 per …
Continue reading “Time to think about more than just anti-virus”
Defence-in-Depth – The Next Step
Yesterday I wrote the opening chapter of this defence-in-depth article – I looked at how anti-virus protection can be side-stepped by threat actors and that staff cyber awareness training is needed to provide another layer to your defences. That was a human addition to your defence-in-depth and today we are …
A Zero-day Primer
The zero-day threat is a serious one for any vendor or organisation to deal with and you should understand how it can defeat your technical defences. Here is a three-part mini-series that takes you through the zero-day threat in a straightforward way so you can make some decisions on how …