The Steering Group of the SWCSC is holding a media event at 3.30pm on Tuesday 6th December 2016 at the Science Park Centre in Exeter to announce the formal support of Devon and Cornwall Police. The SWCSC is a not for profit collaboration of business representatives working to help and support businesses in regard the technological…
Author Archives: Marketing South West CSC
What is Cyber Essentials? The government backed Cyber Essentials scheme is designed to be a light touch to help businesses protect themselves against 80% of the most common cyber attacks Who is Cyber Essentials for? Cyber Essentials is relevant for businesses of all sizes and comprises of five key controls that when implemented provide a…
What Is it As our phones are becoming an increasingly integral part of many things that we do, they are an ideal target for cyber criminals. They will aim to introduce malicious software on to your phone. It could be designed to steal banking information, make app purchases you did not make, send premium SMS/text…
Some simple steps that small businesses can take to protect themselves from cyber threats Step 1 – patch and update Download software and app updates as soon as they appear. They contain vital security upgrades that keep your devices and business information safe. Further advice on software updates Step 2 – set complex passwords One…
What is it? You receive a call from someone from Microsoft Helpdesk telling you that they have discovered a problem with your PC. They ask you if you are near your machine, ask you to log in. They use a ‘let me in’ type link which allows them to take control of your machine.…
What is it and why is it important? Why this is critical: your email is the gateway to many password change mechanisms. If your email is compromised then every website or service you have authenticated access to via your email is vulnerable though ‘Forgotten Password’ recovery mechanisms, unless you use 2 factor authentication and your…
What is it Your phone system being compromised and a multitude of premium calls being put through your system. The first time you may know this has happened is from an unusually high phone bill. First Steps Disconnect phone system immediately, Contact telephone provider to log date and time of suspected attack so they can…
What is it When someone takes control of your social media account such as Facebook or Twitter. This could mean there are posts on your social media page that you did not make. First Steps Try first to change the password if you can get into the account If this is not possible then contact…
What is it Distributed Denial of Service attack – A large amount of data sent via the internet to either your website, or internet facing company perimeter, with the sole purpose of causing your systems to shut down, due to not being able to handle such large numbers of requests simultaneously. A DDOS attack is…
What is it? A Phishing email is one designed to make you click on a malicious link. This could encourage you to divulge personal information such as passwords or bank information download malicious software such as spyware on to your device install ransomware which locks your files and will only release them when you pay…