Quantcast
Channel: CyberSmart
Browsing all 24 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

4 reasons why hackers attack the supply chain

You’re a hacker ready to launch an attack. What do you target?  A: A single person or company that’ll get you a sizeable reward, if the attack is successful? B: A supply chain that could get you access...

View Article



Image may be NSFW.
Clik here to view.

5 steps to better supply chain security

It’s not an exaggeration to say that supply chains pose one of the greatest cybersecurity risks to any business. In recent years, there’s been a huge increase in attacks stemming from supply-chain...

View Article

Image may be NSFW.
Clik here to view.

What SMEs must know about supply-chain attacks

If a thief wants to enter a house, it’s unlikely they’ll choose to ring the doorbell. They’re going to climb through a half-opened window around the back. And if they’re careful enough, the homeowner...

View Article

Image may be NSFW.
Clik here to view.

How to encourage continuous security improvement in your supply chain

Managing and monitoring cybersecurity across an entire supply chain is a challenging task. This is especially true if you’re an SME. However, knowledge and prevention strategies can greatly reduce the...

View Article

Image may be NSFW.
Clik here to view.

Is Cyber Essentials Plus right for my business?

Are you considering Cyber Essentials Plus, but unsure whether it’s right for your business? To help you decide, we’ve pulled together a quick summary of how the government-backed certification works,...

View Article


Image may be NSFW.
Clik here to view.

Cyber insurance vs. cyber warranties: What’s the difference?

Cyber insurance is one of the fastest-growing industries on the planet. Even relatively conservative estimates predict the industry will be worth close to $85 billion by 2030. However, the cyber...

View Article

Image may be NSFW.
Clik here to view.

Social engineering unmasked: guarding against psychological hacks

October is Cyber Security Awareness month, so we’re focussing on a frequently seen threat, social engineering. During my time as a Detective Sergeant leading the Dorset Police Cyber Crime Team, social...

View Article

Press release: A third of SME business leaders do not trust some, most or any...

One in three UK SME business leaders do not trust some, most or any of their employees with confidential information. This is according to a survey of a thousand SME senior leaders and decision-makers...

View Article


Image may be NSFW.
Clik here to view.

IoT: The good, the bad, and the unsecured

As Black Friday and Cyber Monday approach, anticipation is growing for this year’s snips, steals and deals on Internet of Things (IoT) devices. However, amid the thrill of Black Friday bargains, it is...

View Article


Image may be NSFW.
Clik here to view.

How to spot a malware attack on your business: 5 tell-tale signs

Like an unwanted guest causing friction at a party, malware can disguise itself, trick your employees, and cause problems for your business. Here are some tell-tale signs of malware attacks to help you...

View Article

Image may be NSFW.
Clik here to view.

How to avoid phishing scams on Facebook Messenger for Business

Almost since its birth, Facebook has been an important tool for small businesses. It’s a low-cost way to sell your services, interact with customers and build a community around your business. However,...

View Article

Image may be NSFW.
Clik here to view.

New: CyberSmart’s SME cost of living crisis report

At CyberSmart, we recognise that the cost of living crisis not only affects our personal lives, but the way small and medium businesses (SMEs) manage their priorities, too.  Uncertainty is never the...

View Article

Image may be NSFW.
Clik here to view.

Key takeaways from the CyberSmart SME cost of living crisis report

The current economic climate has seen better days, but how are the UK’s small businesses weathering the storm? At CyberSmart, we’re curious about how the cost of living crisis has impacted...

View Article


Image may be NSFW.
Clik here to view.

Lessons from a breached email and inheritance theft

We all spend almost every day plugged into our emails. For most of us, this is our primary source of communication with the rest of the world – whether for work or our personal lives. However, despite...

View Article

Image may be NSFW.
Clik here to view.

Why small businesses are at greater risk of malware attacks

Malware attacks are a well-known concern for businesses, but what type of business is more at risk? Small businesses are just as at risk as large enterprises. In fact, 54% of SMEs reported experiencing...

View Article


Image may be NSFW.
Clik here to view.

What is fileless malware and how can you safeguard your systems?

The most elusive of all malware; fileless malware is a threat you can’t afford to let slip off your radar. It accounts for 40% of global malware, according to research from Arctic Wolf Labs. And...

View Article

Image may be NSFW.
Clik here to view.

What is a remote access takeover?

Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4 million cases of fraud in the first half of 2023 with criminals stealing over £580 million. And worming its way into...

View Article


Image may be NSFW.
Clik here to view.

Demystifying malware: The 5 stages of a malware attack

Malware is almost as old as the first personal computers. And like anything that’s existed for a long time, it’s easy to become complacent about it.  However, if your business has ever fallen victim to...

View Article

Image may be NSFW.
Clik here to view.

How nation-state cyber warfare affects you

We live in a time of increased international tensions. You can scarcely open a newspaper or browse a news site without being greeted by conflict, both in the real world and online. We’re only two...

View Article

Image may be NSFW.
Clik here to view.

What is a banking trojan and how do you stop one?

Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound like Marvel supervillains, they’re all examples of high-profile banking trojans. Emerging in the mid-noughties, banking...

View Article
Browsing all 24 articles
Browse latest View live




Latest Images