Today’s fast-paced digital lifestyle has made the use of QR codes commonplace. From restaurant ordering, event tickets and contactless payments, the little square codes can provide a practical way to quickly access information. Although convenient, they also present significant cyber risks that everyone should be aware of. What is a QR code? Quick Response (QR) […]
The end of financial year is a busy time for all organisations in any country. Accounts teams have all hands on deck for pay runs, tax summaries and bookkeeping. But it’s also a busy time for scammers. Cyber threat actors take advantage of this busy time to capitalise on feelings of urgency and trick accounts […]
In today’s digital age, cyber attacks pose significant threats to all organisations, with impacts ranging from direct financial losses to long‑term reputational damage. Although common perceptions often focus on publicly reported losses, the true extent of cyber incidents includes various hidden costs that rarely brought to public light. Here are six often overlooked or underestimated […]
Identity theft is when someone steals your identity by using your personally identifiable information with the intent to commit fraud or other crimes. Fraud carried out with your stolen identity can have long lasting and major impacts on your life and personal finances. By implementing good identity management practices online and securing your information offline, […]
With new technology regularly emerging, the internet can be a daunting place. Regardless of your level of security or technology expertise, you might eventually have the misfortune of being hacked at home or at work. The more quickly you can identify something is wrong and take action, the more likely you are to lessen the […]
Password policy adherence is no doubt gaining complexity. We hear this comment from client users, as well as the broader business and security community. Frustrations are associated with remembering and managing them, not to mention passwords are one of the most appealing targets for cybercriminals. But what’s the alternative to having a password for each […]
The global threat landscape has been shaped by the constant risk of high-impacting cyber security incidents, data breaches and ransomware. Although trends in digital transformation, such as big data, the Internet of Things (IoT) and artificial intelligence (AI) have provided global citizens with infinite opportunities, they have also amplified ongoing opportunities for attack. Experts, citizens […]
The end of year is fast approaching and many of us will be taking a well-deserved break from work. Whether travelling for a vacation or to visit family and friends for a festive occasion, only a few actions need to be taken to remain cyber safe while you are away from home. Bringing devices Minimise […]
Impersonation scams are the act of fraudulently posing as a person, organisation, or brand in order to trick a potential victim into taking an action or obtaining an unfair gain from them. A scammer will make direct contact with potential victims via text/SMS, phone call or email, or they can leave a trap online, such […]
Cybercriminals are continually evolving the methods they use to trick us into taking actions we shouldn’t take. Enticing us to open infected email attachments, click on harmful links, transfer money, disclose our passwords etc. These attempts can be made across various platforms and technologies like email, social media, text messaging, phone calls, etc. They all […]
- 1
- 2