🔍 What’s Happening? ⚠ Attackers overwhelm users with spam emails, primarily newsletter sign-up confirmations from legitimate organisations.⚠ Follow-up phone calls from individuals impersonating IT team members offer assistance and prompt users to download remote monitoring software like AnyDesk or use Microsoft’s Quick Assist feature.⚠ The goal is to establish a remote connection, allowing attackers to […]
Introduction This blog post is about the critical topic of user security awareness training in businesses and organisations. Whether you’re a business owner or responsible for managing users within one, this article is for you. Cyber Security threats are on the rise, becoming more sophisticated daily. Malicious actors are looking for easy targets, and unfortunately, […]
Introduction In today’s interconnected world, where billions of digital interactions occur daily, businesses must recognise that cyber awareness isn’t a luxury but a necessity. Small and large enterprises can benefit immensely from prioritising cyber awareness as a part of their agenda. This article highlights the substantial long-term advantages of having it at the core of […]
This infographic is about the 10 top types of Phishing Attacks as of today, September 2022.
Two weeks have been left for Australian businesses to make use of the priority registration period and register their domain names under the .au extension. From 20th September 2022, the way we register domain names in Australia is changing, and below is what you should know. What you should know about the change After this […]
This infographic is about the 6 most common Phishing Attacks and how they can be detected.
This blog post discusses the SPF, DKIM and DMARC mechanisms and how organisations can use them to their benefit. Contrary to popular belief, their role is not to protect a mail system against threats. Instead, they act as protection mechanisms for the mail exchange worldwide, adding to the Cyber Hygiene of this ecosystem. Did we […]