Recognise and Report Scams - Scammers impersonate trusted sources to steal your money or personal information. They...

Recognise and Report Scams - Scammers impersonate trusted sources to steal your money or personal information. They...
Every business needs an effective Work-From-Home security checklist. The work environment is no longer confined to...
A critical vulnerability was discovered in the widely used logging utility, Log4J. December 2021 saw IT and security...
AA Traveller Website Hack – AA Traveller announced that a security incident in the AA Traveller website led to customer data being compromised. The now deprecated website allowed customers to make travel bookings, enter competitions, participate in surveys, and...
Recognise and Report Scams - Scammers impersonate trusted sources to steal your money or personal information. They can also try to get access to your company’s systems and steal data. Whether you are working from home, purchasing goods or services, or just catching...
Every business needs an effective Work-From-Home security checklist. The work environment is no longer confined to four walls and an office — it’s wherever you and other employees are. Today’s hybrid work environment allows employees to effectively connect,...
A critical vulnerability was discovered in the widely used logging utility, Log4J. December 2021 saw IT and security teams scramble to identify affected areas and apply drip-fed patches or workarounds issued by vendors. The vulnerability, dubbed Log4Shell, is...
Earlier this year, the Waikato District Health Board (DHB) suffered an unprecedented ransomware attack when over 600 servers were taken down and personal information of employees and patients were leaked onto the dark web. At least five percent of the DHB’s...
The FBI warns businesses that ransomware attackers don't take holidays. In a joint advisory issued by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA), the warning stipulated the need for businesses to be aware...
The question we keep asking is: Why is ransomware so effective against small businesses? Ransomware is a type of malware (still commonly referred to as a computer virus) that’s usually disguised in a phishing email. Once the dangerous attachment or link to an...
Microsoft revealed another zero-day print spooler vulnerability on 11 August. That’s right, Microsoft announced yet another new zero-day print spooler vulnerability after they released patches for the widespread vulnerability known as PrintNightmare in June this year....
There could be spyware installed on your phone – that’s right. Spyware has often been in the news lately, being sold to governments to target politicians and heads of state, business executives, activists, and other parties of interest. What exactly is spyware?...