How to spot spam, phishing & malicious emails
Recently we have seen a large amount of malicious emails, in which the sender claims to have hacked your email account and placed malicious software on your PC to steal your personal information.
Recently we have seen a large amount of malicious emails, in which the sender claims to have hacked your email account and placed malicious software on your PC to steal your personal information.
Recently we have seen a large amount of malicious emails, in which the sender claims to have hacked your email account and placed malicious software on your PC to steal your personal information. These emails can be fairly convincing, often containing an old password of yours that has been compromised in a data-breach and will use email spoofing to make it appear as though it has been sent from your own email account.
Online Security – Take Action Now! We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender it is better to ignore the email than risk opening it.
Windows 7 End of Life is rapidly approaching! Microsoft have announced the official end of life date for Windows 7: January 14th 2020. This means Microsoft will no longer provide updates or support for this operating system that was released a decade ago on the 22nd of July 2009. This may create serious issues, as…
We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender, it is always better to ignore the email than risk opening it.
Online Security – Take Action Now! We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender it is better to ignore the email than risk opening it.
Password Security – Take action now! You may have noticed some discussion in the news recently that several MPs have been sharing their login details with their staff as a matter of course. This brought a lot of criticism from security professionals and the ICO (Information Commissioner’s Office), who have now reminded MPs of their duties under the Data Protection Laws.
What is GDPR? General Data Protection Regulation, or GDPR, will overhaul how businesses process and handle data. This regulation is the biggest change in two decades and will come into force on May 25th 2018. It will change how businesses and public sector organisations can handle information of customers. The GDPR is Europe’s new framework for data…
With cyber-attacks and computer security being heavily publicised throughout the media as of late, we would take this opportunity to drive home the importance of making sure your systems are safeguarded from such threats. 2017 sees an ever increasing rise in cyber crime causing unprecedented levels of disruption with the use of simple IT tools and cloud services.
Updated Google says security biz MCS Holdings has created unauthorized SSL certificates for some Google-owned websites. Anyone with these dodgy certificates could, in theory, set up a web server that masquerades as a legit Google site, and redirect people to the fake site by hijacking their DNS. Chrome and the latest Firefox web browsers should detect…