Risk Remediation (Part 2): Identifying your Cyber Vulnerabilities
Knowing your vulnerabilities in the context of GRC is the first step to managing your cyber risk in GRC. But identifying them isn’t always straightforward.
Risk Assessment (Part 1): The truth about your Cyber Risk
Have you ever stopped to think about your organization’s cyber risk? Really think about it.
Beware that “support call” – it could be a ransomware scam
Would your employees give an unknown caller access to your business devices? But what if they got a Teams chat from someone posing as Microsoft support? Here we tell you all about a new ransomware scam.
Business Email Compromise (or BEC): Attacks on business email accounts are surging
Your business relies on emails every day – that’s exactly why scammers target them. Here’s what you need to know about Business Email Compromise (or BEC).
Security alert: Does your business IT have old logins for ex-staff?
What’s the first thing your business IT team do when someone leaves your business? If it’s not deleting their account logins, it might be time to rethink your process.
New phishing scam is smarter than ever… here’s how to protect your business
Microsoft is warning business owners that trusted cloud storage services are being hijacked to trick you into handing over your data. Here we tell you what you need to know.
How future-ready is your business IT?
Your business’s tech might be working well today, but is your business IT ready for tomorrow? A new study has found more than 60% of business leaders aren’t confident about theirs. What about yours?
Beware this malware: It “annoys” you into handing over login details
A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you’re trapped. But you can easily escape and we’ll tell you how.
A third of all data loss is caused by problems with backups
Your business data is backed up and recovery tools are in place. So, you’re safe from data loss, right? Sadly, not always. Here’s why we recommend backups are checked regularly.
Don’t sleep on MFA, a simple and effective security booster
Microsoft’s enforcing MFA—an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.