Small businesses require cybersecurity to protect their sensitive information and assets from cyber threats such as hacking, phishing, and malware. Without proper security measures in place, small businesses can become easy targets for cybercriminals and suffer serious consequences, such as data breaches, financial losses, and reputational damage. In addition, many small businesses are required by law to comply with regulations such as the General Data Protection Regulation (
Cyber Essentials A7.7 requires organisations to ensure that Administrator accounts are prevented from being used to carry out everyday tasks like browsing the web or accessing email. Therefore, why is working with administrative accounts considered such a high risk? Working with administrative privileges is generally considered a bad idea because it increases the risk of a security incident.
When a user has administrative privileges, they have the ability to make changes t
A Keylogger is spyware that records keystrokes entered by the user and much more. Keyloggers can be hardware or software. Hardware keyloggers are embedded into the internal PC or a plug in is positioned between the CPU and keyboard cable. Software loggers are much more common and easier to install. They work behind the scenes while the computer operates normally. It is worth pointing out that keyloggers are not always illegal. Many companies will use commercial software to tr
Travelling with data can be risky these days. In public spaces, travellers’ devices are exposed to pick pockets, whilst their devices connected to public networks are prone to being snooped on by cyber attackers. Below are a few helpful tips to keep your data safe while travelling abroad: Consider Travel Specific Devices: For businesses and regularly travellers abroad, it may be worthwhile investing in some low-cost devices used exclusively for travel. As a result, data on th
What is Business Email Compromise (BEC): Email is the number one attack vector for hackers. According to the FBI, the cost of Business Email Compromise (BEC) to businesses globally was estimated at $26bn. Business Email Compromise is an exploit where an attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company, their employees, customers or partners. In most cases, the attacker’s goal is to manipulate their victims into authoris