Category Archives: Security

Lack of employee cyber security awareness puts UK firms at risk

By | 8th March 2016

According to the latest research by Axelos, published in the SC Magazine, UK firms are putting themselves under significant risk of cyber breaches due to the lack of cyber security awareness in their employees. Up to 50% of severe breaches are thought to be down to human error, which could be avoided with better training… Read More »

Official: the “worst” passwords of 2015

By | 20th February 2016

The internet security firm SplashData publishes an annual list of the top 25 “worst” passwords among the prevalently North American and West European users. For the year 2015, the list is topped by: “123456”, “password” and “12345678”. Anyone who continues to use a password that is on SplashData’s list published by TeamsID.com is simply asking… Read More »

HM Revenue and Customs cyber security warning – and the phishing email I received just days later

By | 31st January 2016

HM Revenue and Customs are warning of the increased risk of phishing attacks at the time of the annual peak Self Assessment activity heading for the deadline of 31st January. Typically, you will receive an email purporting to be from HMRC urging you to either request a payment of a tax refund,  or to pay… Read More »

The threat of “whaling” – SMEs beware

By | 8th January 2016

Whaling is a type of phishing – an attempt to trick a person to disclose valuable information, usually login details, by way of spoofing an email or a website or by social engineering. Phishing becomes whaling, when targeting high value individuals, such as business managers, company directors or financial controllers. The goal is to either… Read More »

Cyber security is now a necessity since everyone is a target

By | 12th December 2015

Over the past decade, the landscape of cyber threats has multiplied in size but also transformed. Arguably, every computer with any kind of direct or indirect connection to the internet is now a target. The greatest transformation occurred in the use of automated tools by cyber criminals, which allows them to operate at massive scales.… Read More »