What is it? You receive a call from someone from Microsoft Helpdesk telling you that they have discovered a problem with your PC. They ask you if you are near your machine, ask you to log in. They use a ‘let me in’ type link which allows them to take control of your machine.…
Category Archives: News
What is it and why is it important? Why this is critical: your email is the gateway to many password change mechanisms. If your email is compromised then every website or service you have authenticated access to via your email is vulnerable though ‘Forgotten Password’ recovery mechanisms, unless you use 2 factor authentication and your…
What is it Your phone system being compromised and a multitude of premium calls being put through your system. The first time you may know this has happened is from an unusually high phone bill. First Steps Disconnect phone system immediately, Contact telephone provider to log date and time of suspected attack so they can…
What is it When someone takes control of your social media account such as Facebook or Twitter. This could mean there are posts on your social media page that you did not make. First Steps Try first to change the password if you can get into the account If this is not possible then contact…
What is it Distributed Denial of Service attack – A large amount of data sent via the internet to either your website, or internet facing company perimeter, with the sole purpose of causing your systems to shut down, due to not being able to handle such large numbers of requests simultaneously. A DDOS attack is…
What is it? A Phishing email is one designed to make you click on a malicious link. This could encourage you to divulge personal information such as passwords or bank information download malicious software such as spyware on to your device install ransomware which locks your files and will only release them when you pay…
What is a Ransomware Attack – you click on a link or open an attachment which sets off a process resulting in your files being encrypted and you receive a demand for payment to release them First Steps: Unplug from network- pull out network cable to stop ransomware encrypting more files Disconnect from Wi-Fi network:…
First steps – immediate action Switch site to maintenance mode, check you know how to do this. Maintenance mode logs out any users.* If you cannot do this contact your web developer straight away and ask them to do this, or remove access Who to contact Contact your web developer as soon as you can…
What is GDPR According to recent polls, less than 43% of businesses have even heard of the GDPR, so let’s start with what it is. GDPR stands for the General Data Protection Regulation. It’s a complete replacement of the DPA (Data Protection Act) and it brings in a whole new set of accountability requirements on…