Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Top tips to help you avoid being caught receiving or sending phishing-looking emails. If you’re a regular reader of this blog, I suspect you live in a state of perpetual vigilance against targeted attacks such as phishing messages. You know that urgent sounding messages from sender addresses that don’t look right, especially if they include … More Hook, line, and sinker: How to avoid looking ‘phish-y’
Whether travelling to enjoy the matches in person, or watching from home, fans should be on the lookout for foul play. Have you been looking forward to the 2018 FIFA World Cup? So have scammers, kicking it up a notch and looking to cash in on the hype surrounding the quadrennial soccer extravaganza. The fraudsters will … More World Cup scams: how to avoid an own goal
Simply throwing more staff at the patching problem won’t cut it, a study suggests. To paraphrase English novelist Jane Austen, it is a fact universally acknowledged that organizations must act with alacrity when it comes to applying software patches to their systems. A number of recent notorious incidents – think the WannaCryptor malware outbreak or the breach … More Rough patch, or how to shut the window of (unpatched) opportunity
Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices