4 reasons why hackers attack the supply chain
You’re a hacker ready to launch an attack. What do you target? A: A single person or company that’ll get you a sizeable reward, if the attack is successful? B: A supply chain that could get you access...
View Article5 steps to better supply chain security
It’s not an exaggeration to say that supply chains pose one of the greatest cybersecurity risks to any business. In recent years, there’s been a huge increase in attacks stemming from supply-chain...
View ArticleWhat SMEs must know about supply-chain attacks
If a thief wants to enter a house, it’s unlikely they’ll choose to ring the doorbell. They’re going to climb through a half-opened window around the back. And if they’re careful enough, the homeowner...
View ArticleHow to encourage continuous security improvement in your supply chain
Managing and monitoring cybersecurity across an entire supply chain is a challenging task. This is especially true if you’re an SME. However, knowledge and prevention strategies can greatly reduce the...
View ArticleIs Cyber Essentials Plus right for my business?
Are you considering Cyber Essentials Plus, but unsure whether it’s right for your business? To help you decide, we’ve pulled together a quick summary of how the government-backed certification works,...
View ArticleCyber insurance vs. cyber warranties: What’s the difference?
Cyber insurance is one of the fastest-growing industries on the planet. Even relatively conservative estimates predict the industry will be worth close to $85 billion by 2030. However, the cyber...
View ArticleSocial engineering unmasked: guarding against psychological hacks
October is Cyber Security Awareness month, so we’re focussing on a frequently seen threat, social engineering. During my time as a Detective Sergeant leading the Dorset Police Cyber Crime Team, social...
View ArticlePress release: A third of SME business leaders do not trust some, most or any...
One in three UK SME business leaders do not trust some, most or any of their employees with confidential information. This is according to a survey of a thousand SME senior leaders and decision-makers...
View ArticleIoT: The good, the bad, and the unsecured
As Black Friday and Cyber Monday approach, anticipation is growing for this year’s snips, steals and deals on Internet of Things (IoT) devices. However, amid the thrill of Black Friday bargains, it is...
View ArticleHow to spot a malware attack on your business: 5 tell-tale signs
Like an unwanted guest causing friction at a party, malware can disguise itself, trick your employees, and cause problems for your business. Here are some tell-tale signs of malware attacks to help you...
View ArticleHow to avoid phishing scams on Facebook Messenger for Business
Almost since its birth, Facebook has been an important tool for small businesses. It’s a low-cost way to sell your services, interact with customers and build a community around your business. However,...
View ArticleNew: CyberSmart’s SME cost of living crisis report
At CyberSmart, we recognise that the cost of living crisis not only affects our personal lives, but the way small and medium businesses (SMEs) manage their priorities, too. Uncertainty is never the...
View ArticleKey takeaways from the CyberSmart SME cost of living crisis report
The current economic climate has seen better days, but how are the UK’s small businesses weathering the storm? At CyberSmart, we’re curious about how the cost of living crisis has impacted...
View ArticleLessons from a breached email and inheritance theft
We all spend almost every day plugged into our emails. For most of us, this is our primary source of communication with the rest of the world – whether for work or our personal lives. However, despite...
View ArticleWhy small businesses are at greater risk of malware attacks
Malware attacks are a well-known concern for businesses, but what type of business is more at risk? Small businesses are just as at risk as large enterprises. In fact, 54% of SMEs reported experiencing...
View ArticleWhat is fileless malware and how can you safeguard your systems?
The most elusive of all malware; fileless malware is a threat you can’t afford to let slip off your radar. It accounts for 40% of global malware, according to research from Arctic Wolf Labs. And...
View ArticleWhat is a remote access takeover?
Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4 million cases of fraud in the first half of 2023 with criminals stealing over £580 million. And worming its way into...
View ArticleDemystifying malware: The 5 stages of a malware attack
Malware is almost as old as the first personal computers. And like anything that’s existed for a long time, it’s easy to become complacent about it. However, if your business has ever fallen victim to...
View ArticleHow nation-state cyber warfare affects you
We live in a time of increased international tensions. You can scarcely open a newspaper or browse a news site without being greeted by conflict, both in the real world and online. We’re only two...
View ArticleWhat is a banking trojan and how do you stop one?
Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound like Marvel supervillains, they’re all examples of high-profile banking trojans. Emerging in the mid-noughties, banking...
View Article
More Pages to Explore .....