We would like to thank the National Cyber Security Alliance for providing the following valuable information to help protect from phishing threats.Read More
Think twice before you click on this nasty voicemail attachment landing in inboxes this week. With an innocent “Left you a message” subject line, prefaced by a local telephone number and stamped with the date, the email is marked as ‘High Priority' and ‘Sent via Microsoft Voice’. The email is targeting a business in the United States and comes from a compromised account belonging to a legitimate printing company (mountain-media(dot)com) in Colorado.Read More
There has been a 2500% increase in the sale of cybercrime kits on the dark-web since 2016, said Angus Taylor MP, Australian Minister for Law Enforcement and Cyber Security in a recent interview.
Taylor expressed his concern about this surge in online criminal activity. He noted that there has been “a high take-up of digital technologies” by Australian companies, but about 30% of smaller companies have inadequate cybersecurity measures in place.
All these kinds of cybercrime are perpetrated using email as their primary vector.
Every business is constantly sending and receiving emails, it’s part of the background noise of everyday work, so it’s a powerful tool for criminals who want to slip under the wire and attack a company from the inside out.Read More
You have your solicitor look over contracts before they’re signed.
Your accountant examines your books to find any irregularities.
There are checks and balances in place to monitor purchases, invoicing, payroll and transactions of every kind.
You’re confident that your company’s financial integrity is well protected, but what about the online realm?
Every day, cyber criminals are dreaming up new get-rich-quick schemes. Whether impersonating a popular brand on Facebook, offering bulk followers on Instagram, or trying to deceive a well-meaning accounts worker, it’s hard to escape opportunistic scammers.Read More
The attacks can take many names, from CEO Fraud, to Whaling and Business Email Compromise. Whichever name you choose, spear phishing attacks impersonating influential executives continue to be a big problem for businesses of all sizes.Read More
The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.