<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Security &#8211; Cortec IT Solutions</title>
	<atom:link href="https://cortecit.co.uk/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://cortecit.co.uk</link>
	<description>Business IT Support, Server and Network Support - Dartford - Kent</description>
	<lastBuildDate>Tue, 21 Apr 2026 10:01:30 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://cortecit.co.uk/wp-content/uploads/2023/02/cortec-logo.gif</url>
	<title>Security &#8211; Cortec IT Solutions</title>
	<link>https://cortecit.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Threats Have Changed, Has Your Protection?</title>
		<link>https://cortecit.co.uk/cyber-threats-have-changed-has-your-protection/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 10:56:51 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=16345</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://cortecit.co.uk/cyber-threats-have-changed-has-your-protection/">Cyber Threats Have Changed, Has Your Protection?</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2 data-section-id="5u5t2r" data-start="224" data-end="278"><span role="text"><strong data-start="228" data-end="278">Advanced Protection for Your Users and Devices</strong></span></h2>
<p data-start="280" data-end="318">Cyber threats have changed and are evolving rapidly. Many modern attacks no longer rely on traditional malware. Instead, they target user accounts, exploit trusted access, and operate in ways that can bypass standard antivirus solutions entirely. At Cortec IT, we’re continually reviewing how we protect our clients. As part of that, we’re introducing two advanced security services designed to strengthen both device and identity protection.</p>
<h2 data-section-id="qenq3b" data-start="719" data-end="770"><span role="text"><strong data-start="722" data-end="770">Introducing Our Latest Security Enhancements</strong></span></h2>
<h3 data-section-id="17se4gj" data-start="772" data-end="799"><span role="text"><strong data-start="776" data-end="799">Powered by Huntress</strong></span></h3>
<ul>
<li data-start="801" data-end="932">These services are delivered through <a href="https://www.huntress.com/" target="_blank" rel="noopener"><strong data-start="838" data-end="850">Huntress</strong></a>, a leading security platform backed by a 24/7 Security Operations Centre (SOC).</li>
<li data-start="934" data-end="1093">Their team actively monitor, investigates, and responds to potential threats in real time, providing an additional layer of protection beyond traditional tools.</li>
<li data-start="1095" data-end="1256">Huntress also delivers industry-leading response times, typically responding within minutes to confirmed threats, helping to stop incidents before they escalate.</li>
</ul>
<h3 data-section-id="bpsw31" data-start="1263" data-end="1296"><span role="text"><strong data-start="1266" data-end="1296">What Are the New Services?</strong></span></h3>
<h3 data-section-id="q6avgj" data-start="1298" data-end="1352"><span role="text"><strong data-start="1302" data-end="1352">Identity Threat Detection &amp; Response (ITDR)</strong></span></h3>
<p data-start="1354" data-end="1431">ITDR focuses on protecting your Microsoft 365 accounts and user identities.</p>
<p data-start="1433" data-end="1613">Today’s attackers often target login credentials or session tokens rather than devices themselves. This allows them to gain access without triggering traditional security alerts.</p>
<p data-start="1615" data-end="1631">ITDR helps to:</p>
<ul data-start="1632" data-end="1771">
<li data-section-id="7o0w8m" data-start="1632" data-end="1679">Detect suspicious or unusual login activity</li>
<li data-section-id="1ivtoii" data-start="1680" data-end="1720">Identify signs of account compromise</li>
<li data-section-id="1vc0tpp" data-start="1721" data-end="1771">Respond quickly to prevent unauthorised access</li>
</ul>
<p data-start="1773" data-end="1847">This is particularly important as identity-based attacks continue to rise.</p>
<h3 data-section-id="1nt6k7p" data-start="1854" data-end="1899"><span role="text"><strong data-start="1858" data-end="1899">Managed Detection &amp; Response (MDR)</strong></span></h3>
<p data-start="1901" data-end="1984">MDR enhances protection across your devices, including PCs, laptops, and servers.</p>
<p data-start="1986" data-end="2152">Unlike traditional antivirus, MDR monitors behaviour and <strong data-start="2043" data-end="2064">fileless activity</strong> in real time, allowing it to detect advanced threats that don’t rely on known malware.</p>
<p data-start="2154" data-end="2174">With MDR in place:</p>
<ul data-start="2175" data-end="2328">
<li data-section-id="1gy9v6u" data-start="2175" data-end="2218">Suspicious activity is identified early</li>
<li data-section-id="18fmtvx" data-start="2219" data-end="2272">Threats can be investigated and contained quickly</li>
<li data-section-id="vg3llx" data-start="2273" data-end="2328">Devices can be isolated if needed to prevent spread</li>
</ul>
<h3 data-section-id="e38tal" data-start="2335" data-end="2358"><span role="text"><strong data-start="2338" data-end="2358"><br />
Why This Matters</strong></span></h3>
<p data-start="2360" data-end="2423">Traditional security tools are no longer enough on their own.</p>
<p data-start="2425" data-end="2446">Modern attacks are:</p>
<ul data-start="2447" data-end="2545">
<li data-section-id="ie1wi1" data-start="2447" data-end="2469">More sophisticated</li>
<li data-section-id="1x1wf7g" data-start="2470" data-end="2490">Harder to detect</li>
<li data-section-id="1yz0j5" data-start="2491" data-end="2545">Often focused on user accounts rather than devices</li>
</ul>
<p data-start="2547" data-end="2747">By combining identity and endpoint protection with 24/7 monitoring, these services provide a much stronger security posture, helping to reduce the risk of downtime, data breaches, and financial impact.</p>
<h3 data-section-id="18m8xom" data-start="2754" data-end="2788"><span role="text"><strong data-start="2757" data-end="2788">Who Are These Services For?</strong></span></h3>
<p data-start="2790" data-end="2856">These services are particularly valuable for organisations that:</p>
<ul data-start="2857" data-end="3065">
<li data-section-id="1nc2hi4" data-start="2857" data-end="2910">Rely on Microsoft 365 for email and collaboration</li>
<li data-section-id="yj5e9q" data-start="2911" data-end="2936">Handle sensitive data</li>
<li data-section-id="new3vt" data-start="2937" data-end="3005">Want greater visibility and faster response to potential threats</li>
<li data-section-id="8kk1m" data-start="3006" data-end="3065">Don’t have access to a dedicated in-house security team</li>
</ul>
<h3 data-section-id="715kj5" data-start="3072" data-end="3098"></h3>
<h3 data-section-id="715kj5" data-start="3072" data-end="3098"><span role="text"><strong data-start="3075" data-end="3098">Try It for Yourself</strong></span></h3>
<p data-start="3100" data-end="3259">For our <strong data-start="3108" data-end="3139">existing IT support clients</strong>, we’re offering the opportunity to trial these services and see the protection in action within your own environment. We highly recommend these services as part of a modern security approach built to detect, respond to, and stop threats in real time.</p>
<p data-start="3395" data-end="3485"><strong data-start="3398" data-end="3485">If you’re an existing client, get in touch with us today to arrange your free trial.</strong></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3 data-section-id="1guv1n0" data-start="3492" data-end="3518"><span role="text"><strong data-start="3495" data-end="3518">Want to Learn More?</strong></span></h3>
<p data-start="3520" data-end="3752">If you’re not currently a Cortec IT client but would like to learn more about how we can support your business, feel free to <a href="/contact">contact</a> our team. We’ll be happy to discuss your requirements and how we can help strengthen your security. Providing <a href="https://cortecit.co.uk/it-support-kent/">expert IT Support and Managed IT Services across Kent</a>, London, and the South East. For regular updates, please follow us on <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">LinkedIn</a>.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/cyber-threats-have-changed-has-your-protection/">Cyber Threats Have Changed, Has Your Protection?</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Encryption Viruses</title>
		<link>https://cortecit.co.uk/ransomware-encryption-viruses/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Wed, 01 May 2024 16:00:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=13522</guid>

					<description><![CDATA[<p>We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender, it is always better to ignore the email than risk opening it.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/ransomware-encryption-viruses/">Ransomware Encryption Viruses</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="1000" height="750" src="https://cortecit.co.uk/wp-content/uploads/2018/06/ransomware.jpg" class="vc_single_image-img attachment-full" alt="Ransomware and Encryption Viruses" title="Computer security or safety concept. Laptop keyboard with lock a" srcset="https://cortecit.co.uk/wp-content/uploads/2018/06/ransomware.jpg 1000w, https://cortecit.co.uk/wp-content/uploads/2018/06/ransomware-300x225.jpg 300w, https://cortecit.co.uk/wp-content/uploads/2018/06/ransomware-768x576.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px"  data-dt-location="https://cortecit.co.uk/?attachment_id=6658" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1><strong>Ransomware and Encryption Viruses </strong></h1>
<p>&nbsp;</p>
<p>We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender, it is always better to ignore the email than risk opening it.<br />
Fake emails or emails containing fake links &amp; attachments are routinely used to gain access to small business accounts or banking information. Anti-virus and Anti-spam tools will stop most of these but users still have a vital role to play.</p>
<p>&nbsp;</p>
<h2><strong>Key information on Ransomware/Viruses</strong></h2>
<p>&nbsp;</p>
<p>By now you will probably be aware of the term ransomware, but in short it is a type of malware that will attack your computer, locking you out and displaying a message that demands you take a certain action, almost always involving some form of forced payment before your computer can be returned to its normal state.<br />
Following on from this you may have heard of a type of ransomware known as an Encrypto or Encryption virus. This is an extremely intrusive and potentially costly piece of malware that will in addition to locking you out of your computer, set a fixed time that you have to unlock it.<br />
After a computer or server has been infected with the virus, a message will come up on your screen stating that your files have been encrypted and a warning saying that if you do not send a specified amount of money within a fixed amount of time, all of your information and user data will be lost indefinitely.</p>
<p><strong>So how does the Encrypto virus spread? </strong></p>
<p>It is typically distributed via email, the hackers hide strings of code containing the Encrypto virus within an attachment that for example may look like a normal PDF but in reality is an executable file.<br />
If you or a colleague opens the fake PDF, the virus is given access to your PC and all of your files. It will then start encrypting the files on your computer and begin telling you that the only way you can get the key to decrypt all of your files on your PC is to pay them before time runs out.</p>
<p>&nbsp;</p>
<h2><strong>Two new types of Matrix Ransomware.</strong></h2>
<p>&nbsp;</p>
<p>Recently two new aggressive forms of Matrix Ransomware variants have been discovered that are being installed via hacked/intercepted Remote Desktop services. While both of these variants will encrypt your computer&#8217;s files, one is a more advanced and makes use of cipher strings to wipe free space on the infected systems.<br />
This form of ransomware is being sent to victims from the attackers who are brute forcing their way through the passwords of Remote Desktop services connected directly to the Internet. Once the attacker has gained access to a computer, they will then upload the ransomware installer and execute it via the remote connection.</p>
<p><strong>Basic info about the two viruses and what they do to an infected machine:</strong></p>
<p class="wysija_list_item align-left">• Installed over hacked Remote desktop tools.</p>
<p class="wysija_list_item align-left">• They encrypt unmapped network shares.</p>
<p class="wysija_list_item align-left">• Displays a status window while encrypting data.</p>
<p class="wysija_list_item align-left">• Clears all shadow volumes and copies on the machine.</p>
<p class="wysija_list_item align-left">• Encrypts all of the machines filenames.</p>
<p class="wysija_list_item align-left">• Uses ciphers to wipe free space on the machines.</p>
<p>&nbsp;</p>
<p>Due to the fact the Matrix Ransomware is installed via hacked Remote Desktop services, it is extremely important to ensure that all access is locked down correctly. This includes making sure that computers running remote desktop services are not connected directly to the Internet, instead placed behind secure VPNs or remote desktop gateways that are secured with an active SSL.</p>
<p>&nbsp;</p>
<h2 class="align-center"><strong>How can all of this be prevented?</strong></h2>
<p>&nbsp;</p>
<p>Unfortunately, there is no way to 100% prevent these types of attacks, our recommendations to help safe guard you are:<br />
<strong>Make sure that all staff are vigilant</strong> when it comes to emails from senders that you don’t know, especially those of which that contain files.</p>
<p><strong>Enabling file extensions within Windows</strong> is done so that you can easily recognise this type of attack by the file name containing .exe, .cmd or .bat instead of the standard .docx, .docs or .pdf.</p>
<p><strong>Lock down remote desktop access.</strong> We have been actively locking down RDP to known ip addresses and helping to ensure that computers on your servers are placed behind VPNs or remote desktop gateways secured with SSL.</p>
<p><strong>Have up to date Anti-virus and Anti-spam filters. </strong>Cortec recommends the use of ESET, which is a record-breaking antivirus and antispyware protection software. We also recommend the use of Email Filtering, using advanced predictive analytics giving the reassurance that the software will identify malicious sources before they can attack, keeping your email and IT systems safe. Feel free to get in touch to find out what we can offer you.</p>
<p><strong>Having regular and secure backups of critical data.</strong> We’d like to remind you of the importance of having a backup system in place for your critical files. This will help mitigate the damage caused not only by malware infections, but hardware problems or any other incidents as well. Cortec offer a range of offsite backups and cloud services that we are happy to talk to you about.<br />
<strong>Don&#8217;t give them money.</strong> If you are unfortunately infected by a ransomware virus and do not have a backup of your files, we would always recommend that you <strong>DO NOT pay the ransom.</strong></p>
<p><strong>Upgrade operating system. </strong>To safeguard against ransomware and encryption viruses, it&#8217;s crucial to upgrade operating system such as Windows promptly when Microsoft announces the <a href="https://cortecit.co.uk/windows-end-of-life/">end of life for a version</a>, ensuring your system remains secure and supported.</p>
<p>We say this because it makes malware attacks like the aforementioned into a highly profitable process, not to mention the chance that you will not even receive an encryption key.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Regular backups, system updates, and employee awareness are crucial in preventing attacks. Partnering with a trusted provider like Cortec IT <a href="https://cortecit.co.uk/it-support-kent/">Business IT Support Kent</a> ensures your business has professional IT support to implement these measures effectively.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="text-align: center;">We hope you found this page helpful. Please visit the “About Us” page to learn more <a href="https://cortecit.co.uk/about-us/">about our team</a>.<br />
Additionally, if you’d like to stay up-to-date, please follow us on <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">social media</a>.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/ransomware-encryption-viruses/">Ransomware Encryption Viruses</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Security</title>
		<link>https://cortecit.co.uk/password-security/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Wed, 01 May 2024 15:50:54 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=13516</guid>

					<description><![CDATA[<p>Password Security - Take action now! You may have noticed some discussion in the news recently that several MPs have been sharing their login details with their staff as a matter of course. This brought a lot of criticism from security professionals and the ICO (Information Commissioner’s Office), who have now reminded MPs of their duties under the Data Protection Laws.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/password-security/">Password Security</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2 style="text-align: center;"><strong>Password Security &#8211; Take action now!</strong></h2>
<p>&nbsp;</p>
<p>You may have noticed some discussion in the news recently that several MPs have been sharing their login details with their staff as a matter of course. This brought a lot of criticism from security professionals and the ICO (Information Commissioner’s Office), who have now reminded MPs of their duties under the Data Protection Laws. The existing data protection laws and the new GDPR states that you have a duty of care over any personal data held within your systems. This potentially opens up companies to fines if these duties are not treated seriously or breached without pre-emptive measures.</p>
<p>Username and password combinations are the primary methods used for authenticating users, allowing them access to data and mailboxes. We’re seeing increased amount of attacks on networks where criminals try guessing usernames and passwords, with the intention being to either steal data or more often install a virus to encrypt files and then blackmail companies.</p>

		</div>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div><div class="hr-thin style-line" style="width: 100%;border-top-width: 1px;"></div><div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3 style="text-align: center;"><strong>The Basics</strong></h3>
<p>&nbsp;</p>
<p>At a basic level, you shouldn’t share your password with anyone, this includes members of staff and colleagues. A crucial part of our staff contracts is that breaking this could lead to potential disciplinary action. If you need a team to access your emails or documents, it&#8217;s always better to set up permissions correctly rather than giving out your password; we can help.<br />
We recommend that you pick a good password that is as complex as you can remember but, more importantly, of sufficient length. We recommend setting a password of at least eight characters comprising two words, some numbers and special symbols ($,@,#, etc.).</p>
<p>&nbsp;</p>
<p><a href="https://www.strongpasswordgenerator.org/" target="_blank" rel="noopener">Click here</a> to generate some examples of strong passwords, as mentioned above. Use a different password for your work account and other places. If someone manages to get hold of your Facebook password, you don’t want them to have access to your work email. An example is a website that you frequent has a security breach leading to all registered email addresses and passwords being stolen; the criminals could then use the email address to look up the users&#8217; mailboxes and try the same passwords across multiple platforms. They could for example use the compromised email and password to gain access to and do some online shopping.</p>

		</div>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div><div class="vc_row wpb_row vc_inner vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_center">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"></div>
		</figure>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4 style="text-align: center;"><span style="text-decoration: underline;"><strong>Do</strong></span></h4>
<ul>
<li style="text-align: left;">The use of both upper-case and lower-case letters.</li>
<li style="text-align: left;">Inclusion of one or more numerical digits.</li>
<li style="text-align: left;">Inclusion of special characters, such as @, #, $, etc.</li>
<li style="text-align: left;">Have a minimum recommended Length of 8.</li>
<li style="text-align: left;">Change your password regularly.</li>
</ul>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_center">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"></div>
		</figure>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4 style="text-align: center;"><span style="text-decoration: underline;"><strong>Do Not</strong></span></h4>
<ul>
<li style="text-align: left;">Use words related to personal information.</li>
<li style="text-align: left;">Give your password out to anyone.</li>
<li style="text-align: left;">Use the same password across multiple platforms.</li>
<li style="text-align: left;">Keep passwords noted down physically or virtually.</li>
</ul>

		</div>
	</div>
</div></div></div></div><div class="gap" style="line-height: 20px; height: 20px;"></div><div class="hr-thin style-line" style="width: 100%;border-top-width: 1px;"></div><div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4 style="text-align: center;"><strong>Two Factor Authentication</strong></h4>
<p>&nbsp;</p>
<p>Two-factor authentication, or 2FA, adds a layer to your primary login. Without 2FA, you can enter your username and password to gain access to an account. A password is a form of single-factor authentication. The second factor is in place to help make your account less prone to forced entry.  The three main types of multi-factor authentication:</p>
<p>&nbsp;</p>
<ul>
<li>Something unique that you will remember, such as a personal identification number (PIN), a pattern or a password.</li>
<li>Something you have on you: This will be a fob or phone that randomly generates an authentication code every 30 to 60 seconds.</li>
<li>You, a modern form of multi-factor authentication can be a facial recognition scanner,  a fingerprint scanner or a voice print system.</li>
</ul>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Regularly updating passwords, using multi-factor authentication, and monitoring accounts can significantly reduce security risks. Partnering with a trusted provider like <a href="https://cortecit.co.uk/it-support-kent/">Cortec IT Business IT Support in Kent</a> ensures your business has expert IT support to implement these measures effectively.</p>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="text-align: center;">Please get in touch with our experienced IT support team for any <a href="https://cortecit.co.uk/cyber-security/">Cyber Security</a> service in Dartford, Kent, South East England. Similarly, you can explore our <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">social media</a> for news, views and reviews.</p>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div id="attachment_15667" style="width: 1210px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-15667" class="wp-image-15667 size-full" src="https://cortecit.co.uk/wp-content/uploads/2024/05/Password-Security.jpg" alt="Password Security" width="1200" height="675" srcset="https://cortecit.co.uk/wp-content/uploads/2024/05/Password-Security.jpg 1200w, https://cortecit.co.uk/wp-content/uploads/2024/05/Password-Security-300x169.jpg 300w, https://cortecit.co.uk/wp-content/uploads/2024/05/Password-Security-1024x576.jpg 1024w, https://cortecit.co.uk/wp-content/uploads/2024/05/Password-Security-768x432.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /><p id="caption-attachment-15667" class="wp-caption-text">Password Security</p></div>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/password-security/">Password Security</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Director Fraud Follow Up</title>
		<link>https://cortecit.co.uk/director-fraud-follow-up/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Wed, 12 Apr 2023 10:12:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=9819</guid>

					<description><![CDATA[<p>We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender it is better to ignore the email than risk opening it.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/director-fraud-follow-up/">Director Fraud Follow Up</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1 style="text-align: center;">Director Fraud Follow-Up</h1>
<p>&nbsp;</p>
<p>We want to reiterate that all users must be cautious when clicking any link, be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not from the stated sender, verifying its legitimacy before interacting with it is better.</p>
<p>&nbsp;</p>
<p>Spoofed emails or emails containing fake links &amp; attachments are routinely used to gain access to business accounts and gather personal, business and banking information. Anti-virus and Anti-spam tools will help block a large majority of these, but they can sometimes slip through the cracks, leaving it up to you to spot anything suspicious before it&#8217;s too late.</p>
<p>&nbsp;</p>
<h2 style="text-align: center;">Director Fraud &amp; Online Security</h2>
<p>&nbsp;</p>
<p>Suppose you receive an email that you feel could be fraudulent or malicious. In that case, it&#8217;s always best to tread carefully and check with the sender before giving over any passwords or information that cyber criminals could use.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4><strong>Director Fraud</strong></h4>
<p>&nbsp;</p>
<p>Lately, we have seen a significant increase in spoof emails from cyber criminals claiming to be company directors, accountants and managers, targeting staff members to gain access to systems &amp; information. Many emails get the victim to buy gift cards or a similar purchase.</p>
<p>The fraudster will register domains designed to be highly similar to a targeted company and data farm information from public records such as a Companies House or LinkedIn to find company directors&#8217; names and information so they can set up fake email accounts in their names.</p>
<p>So using our domain as an example, &#8220;@cortecit.co.uk&#8221;, they may set up &#8220;@coretecit.co.uk&#8221; to trick users.</p>
<p>&nbsp;</p>
<p><strong>Most common types of scam emails:</strong></p>
<p>&nbsp;</p>
<ul>
<li>Someone will pose as a boss or director of a company, instructing a staff member to send them money or provide information. This is often in the form of buying gift cards or vouchers.</li>
<li class="wysija_list_item align-left">We have seen them pose as an IT company/department of a bank, saying they will need to make a series of test transfers.</li>
<li>Will pose as a supplier claiming you have unpaid invoices with a link used to farm information from you, install malware or get you to send them money.</li>
</ul>
<p>The display name will be correct in these instances, but the email address must be genuine. This may only show up in some email clients, such as mobile phones.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4><strong>How to ensure you&#8217;re protected</strong></h4>
<p>&nbsp;</p>
<p><strong>Our top recommendations:</strong></p>
<p>&nbsp;</p>
<ul>
<li>Ensure all members of staff are aware of this kind of fraud / spoofing.</li>
<li>Have a procedure in place that allows all members of staff to properly verify contact from Managers and Directors.</li>
<li>You should have a two-step authentication procedure in place before any monetary  transactions are made, this could be as little as a pin/phrase sent in the email, all the way up to verbal confirmation of a transaction either in person or over the phone.</li>
<li>Always review any form of financial transactions for errors and changes, such as a misspelt company name or email address, changes in bank details, etc.</li>
<li>Work out and consider what information about your company is publicly available and whether it needs to be public, places you should check include: Companies House, social media platforms and company websites.</li>
<li>Ensure that all computer systems are secure and that antivirus/antispam software is up to date and installed where appropriate.</li>
</ul>
<p><strong><br />
Microsoft Defender For Office 365</strong></p>
<p>&nbsp;</p>
<p>User impersonation protection is a security feature provided by Microsoft Defender for Office 365 that helps protect users from phishing attacks. Phishing attacks are attempts by cybercriminals to trick users into sharing sensitive information, such as login credentials, by posing as a legitimate entity or person.</p>
<p>With user impersonation protection, Microsoft Defender for Office 365 uses machine learning models to analyse incoming emails and detect signs of phishing attempts. These models identify emails that attempt to impersonate a user or a trusted entity, such as a company or a brand, and mark them as suspicious or block them outright.</p>
<p>User impersonation protection works by comparing the sender&#8217;s display name, email address, and other attributes to known information about the user or entity they claim to be. If there is a mismatch, the email is flagged as suspicious.</p>
<p>Additionally, Microsoft Defender for Office 365 can also learn from user feedback. If a user marks an email as phishing or not phishing, the system can use that feedback to improve its detection accuracy.</p>
<p>In summary, user impersonation protection is a crucial security feature that helps protect users from phishing attacks by identifying and blocking suspicious emails that attempt to impersonate a user or a trusted entity.</p>
<p>&nbsp;</p>
<p>If you have any questions, <a href="https://cortecit.co.uk/contact/">contact us</a>, you can talk to us about possible ways to improve your security and help put measures in place to reduce the chance of successful fraudulent attacks. Similarly, you can leave us message via our <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">social media</a> as well.</p>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div></div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/director-fraud-follow-up/">Director Fraud Follow Up</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Common cyber threats and how to help prevent them</title>
		<link>https://cortecit.co.uk/common-cyber-threats-and-how-to-help-prevent-them/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Fri, 24 Mar 2023 11:52:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=9807</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://cortecit.co.uk/common-cyber-threats-and-how-to-help-prevent-them/">Common cyber threats and how to help prevent them</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2 style="text-align: center;"><strong>Common cyber threats and how to help prevent them in the UK</strong></h2>
<p>&nbsp;</p>
<p>Cyber threats are a serious concern in today&#8217;s digital world, and we must all take steps to protect ourselves from potential harm. Here are some common cyber threats that you need to be aware of and how you can prevent them:</p>
<p>&nbsp;</p>
<p><strong>Malware Attacks</strong></p>
<p>&nbsp;</p>
<p>Malware is like a virus that can cause harm to your computer or network. Be careful when downloading attachments or clicking links from unknown sources to prevent malware infections. Keep your antivirus software up to date and scan your computer regularly for any malware or viruses.</p>
<p>&nbsp;</p>
<p><strong>Phishing Scams</strong></p>
<p>Phishing scams are attempts to steal sensitive Information, such as passwords or credit card numbers. To avoid these scams, please be careful of unsolicited requests for personal Information and never click on links from unknown sources. Use anti-phishing software to detect and prevent these types of scams.</p>
<p>&nbsp;</p>
<p><strong>Ransomware</strong></p>
<p>Ransomware is a specific type of malware that can lock you out of your system or encrypt your files, demanding a ransom in exchange for the decryption key. Be careful when opening emails or clicking links from unknown sources to prevent ransomware attacks. Keep your software updated with the latest security patches, and back up your important files regularly.</p>
<p>&nbsp;</p>
<p><strong>Social Engineering</strong></p>
<p>&nbsp;</p>
<p>Social engineering attacks involve tricking you into giving away sensitive Information, such as passwords or credit card numbers. To prevent social engineering attacks, be cautious when responding to requests for personal Information, verify the identity of the person or organisation making the request, and use two-factor authentication to protect your accounts.</p>
<p>&nbsp;</p>
<p><strong>Identity Fraud (CEO/Accounts/Director fraud)</strong></p>
<p>&nbsp;</p>
<p>Cybercriminals can use stolen or false personal Information to impersonate someone and gain access to sensitive Information or resources, damaging businesses and individuals. To prevent identity/director fraud, keeping your personal Information secure and limiting access to sensitive data is essential. Companies should implement robust identity verification procedures and monitor accounts and transactions for suspicious activity.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Regular system updates, staff training, and professional monitoring can significantly reduce cyber risks. Partnering with a trusted provider like <a href="https://cortecit.co.uk/it-support-kent/">Cortec IT’s IT Support Kent</a> ensures your business has continuous protection and expert guidance.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>What to do if you suspect you are a cybercrime victim?</strong></p>
<p>&nbsp;</p>
<p>If you suspect that your computer or personal Information has been compromised, act quickly to minimise the damage. Here are some steps you can take if you have been compromised:</p>
<ul>
<li>Disconnect from the internet</li>
<li>Change your passwords</li>
<li>Notify your bank and credit card companies</li>
<li>Update your software</li>
<li>Scan your computer for malware</li>
<li>Monitor your accounts</li>
<li>Seek professional help</li>
</ul>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><img decoding="async" class="aligncenter wp-image-15605 size-full" src="https://cortecit.co.uk/wp-content/uploads/2023/03/Common-cyber-threats-and-how-to-help-prevent-them.jpg" alt="Common cyber threats and how to help prevent them" width="1200" height="675" srcset="https://cortecit.co.uk/wp-content/uploads/2023/03/Common-cyber-threats-and-how-to-help-prevent-them.jpg 1200w, https://cortecit.co.uk/wp-content/uploads/2023/03/Common-cyber-threats-and-how-to-help-prevent-them-300x169.jpg 300w, https://cortecit.co.uk/wp-content/uploads/2023/03/Common-cyber-threats-and-how-to-help-prevent-them-1024x576.jpg 1024w, https://cortecit.co.uk/wp-content/uploads/2023/03/Common-cyber-threats-and-how-to-help-prevent-them-768x432.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>In conclusion, cyber threats are a serious issue we must be aware of. By taking the necessary precautions, being vigilant, and following the steps above, you can help protect yourself and your business from potential harm. However, please <span style="box-sizing: border-box; margin: 0px; padding: 0px;">contact our experienced IT support team for any <a href="https://cortecit.co.uk/cyber-security/" target="_blank" rel="noopener">cybersecurity</a> services in Dartford, Kent, or the South East England region</span>. Similarly, you can explore our <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">social media</a> for news, views and reviews on Common cyber threats and how to help prevent them.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/common-cyber-threats-and-how-to-help-prevent-them/">Common cyber threats and how to help prevent them</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to spot spam, phishing &#038; malicious emails</title>
		<link>https://cortecit.co.uk/how-to-spot-spam-phishing-malicious-emails/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 10:09:58 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=5239</guid>

					<description><![CDATA[<p>Recently we have seen a large amount of malicious emails, in which the sender claims to have hacked your email account and placed malicious software on your PC to steal your personal information.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/how-to-spot-spam-phishing-malicious-emails/">How to spot spam, phishing &#038; malicious emails</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="gap" style="line-height: 20px; height: 20px;"></div>
	<div  class="wpb_single_image wpb_content_element vc_align_center">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="1000" height="667" src="https://cortecit.co.uk/wp-content/uploads/2020/02/phishing-1.jpg" class="vc_single_image-img attachment-full" alt="How to spot spam, phishing &amp; malicious emails" title="phishing" srcset="https://cortecit.co.uk/wp-content/uploads/2020/02/phishing-1.jpg 1000w, https://cortecit.co.uk/wp-content/uploads/2020/02/phishing-1-300x200.jpg 300w, https://cortecit.co.uk/wp-content/uploads/2020/02/phishing-1-768x512.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px"  data-dt-location="https://cortecit.co.uk/how-to-spot-spam-phishing-malicious-emails/phishing-3/" /></div>
		</figure>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2>How to Spot Junk / Mail</h2>
<p>We get hundreds of reports each month of spam emails and potential malicious emails being sent to company staff members. So, we though it might be a good idea to put together a guide on ways that you can spot if an email is legitimate.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1 style="text-align: center;">How to spot spam, phishing &amp; malicious emails</h1>
<h3></h3>
<p>&nbsp;</p>
<p>When receiving emails from potential clients and leads (users who are not regular correspondents), you will need to take further steps to determine whether the email is a legitimate enquiry.</p>
<p>&nbsp;</p>
<h2>1. Who sent the email &amp; were you expecting it?</h2>
<p>&nbsp;</p>
<p>The first thing that everyone looks at when they get an email is who it has been sent from. More often than not this provides instant feedback on an emails legitimacy. You should have an idea of the names and email addresses of people that you work with and often correspond with, so when an email comes in from an unknown sender it is always best to verify its integrity before responding to it.</p>
<p>Check who has sent the email, if you press a reply button always take a look at the return path / who you will be responding to. Does this match up to the content of the email? Does this email look to be a genuine enquiry? And finally does the email address match up to any previous enquiries?</p>
<p>One further trick you can do is look up the users email address online to check if it has been flagged anywhere online for spam.</p>
<p>Another thing you can do is see if the email address matches up to a company’s website. For example, if you were to lookup: sales@cortecit.co.uk, you would find our website and verify that the domain used in the email matches that of our website.</p>
<p>&nbsp;</p>
<p>When receiving emails from potential clients and leads (users who are not regular correspondents), you will need to take further steps to determine whether the email is a legitimate enquiry.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>2. What is the subject line?</h3>
<p>The second thing that we all do when examining an email is check the subject line. Spammers &amp; online fraudsters will try their very best to make their emails look legitimate but at the same time want to draw your attention.</p>
<p>A lot of the time they will use eye-catching headings like “Limited Time”, “Important”, “Urgent” and other such hyperbolic titles. You will also see multiple prompting headings such as &#8220;Immediate Action&#8221;, “Required”, “Take Steps Now” or &#8220;Verify Now&#8221;.</p>
<p>Also be wary of any emails that do not contain any headings, since it may either be spam or a genuinely important letter that was sent in haste.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>3. Grammar and tone of the email.</h3>
<p>Examine its content. Firstly, if an email addresses you as “Sir/Madam”, “Colleague”, “Company Name”, “Department” or anything that is vague and seems abnormal, you can instantly question if it was sent from a legitimate source.</p>
<p>Secondly, check for consistent bad spelling, poor/incorrect grammar and blatant red flags in regard to tone and sentence structure. We are all prone this here and there, but if this is consistent across an entire email chain it can be a sign of spam mail. This point is situational, depending on target audience of your business, reach of your company and many other factors, however, if this is flagged along with other points raised it could be used as evidence of illegitimacy.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>4. Purpose of the email.</h3>
<p>Why has this individual sent you the email? As mentioned previously are you being prompted to “Take Action”, send funds or complete a task that is not normal?</p>
<p>When requested to send funds or make a payment, it sounds obvious, but you should always take extreme care to ensure you are not being targeted:</p>
<ul>
<li>Verify that the payment is legitimate with any relevant staff members.</li>
<li>Implement verbal confirmations when transferring money internally between accounts.</li>
<li>Verify that the location of the payment is correct and legitimate.</li>
<li>Make sure you do not give out any billing information to con-artists.</li>
</ul>
<p>When prompted to “Take Action”, “Urgent” and other such prompts:</p>
<ul>
<li>Is this a service that you use?</li>
<li>Search online to verify that the task they are asking you to complete is real.</li>
<li>Has this been sent to other users, and has it been flagged online as a phishing email?</li>
<li>Is the email trying to get you to click a dodgy link?</li>
</ul>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>5. Links and attachments.</h3>
<p>Within the email that you are analysing have you been asked at any point to click on a link or button to complete a certain action? If so the first thing before clicking on a link is to check the destination that you are being taken to.</p>
<p>There are a few ways to check this:</p>
<ul>
<li>If you are using a laptop/pc/mac, you are able to hover over the link with you cursor and in the bottom left of most browsers and mail systems you will see where the link is taking you. Depending on what device/system you may even get a preview box popup over the link with the address.</li>
<li>The second option is to right click and “copy hyperlink” / “copy link address”. You can then paste the link into a text area, such as notepad, Microsoft word or any other text areas without having to click/open the link.</li>
</ul>
<p>Does the link look suspicious? If the link for any reason feels malicious then it is best to do further research before clicking on it. The only definitive way to ensure that a link is legitimate is to ask the user that has sent and verify that it’s a genuine enquiry. If it has been sent from an unknown sender, then the best course of action is to simply not click it.</p>
<p>The same advice all applies to files and attachments within an email, if you are not expecting an attachment from the sender, then its best to verify its legitimacy before attempting to open it.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>6. Check the email chain for any dates.</h3>
<p>Dates and timestamps contained within an email can often provide a clue to an email&#8217;s legitimacy and takes seconds to check. If you receive an email containing dates that are abnormal (distant past or forward dated), it is likely that the email is not genuine.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>7. If it looks dodgy it probably is.</h3>
<p>It is always best practice to be cautious when opening any email regardless of who it is sent from. If an email even looks slightly illegitimate, it is best to follow the previous 6 steps before opening any links or attachments.</p>
<p>You should never open an attachment unless you know who sent it to you, why they have sent it to you and what its purpose is.</p>
<p>It is possible to receive an email from a colleague that is illegitimate, to find out more on this please read our 2 previous post on <a href="https://cortecit.co.uk/spam-spoofed-emails-ext/">email spoofing</a>, <a href="https://cortecit.co.uk/director-fraud-online-security/">director fraud/online security</a> and <a href="https://cortecit.co.uk/phishing/">Phishing</a>.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/how-to-spot-spam-phishing-malicious-emails/">How to spot spam, phishing &#038; malicious emails</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spam Spoofed Emails</title>
		<link>https://cortecit.co.uk/spam-spoofed-emails/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Sun, 11 Oct 2020 09:28:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cortecit.co.uk/?p=4570</guid>

					<description><![CDATA[<p>Recently we have seen a large amount of malicious emails, in which the sender claims to have hacked your email account and placed malicious software on your PC to steal your personal information. These emails can be fairly convincing, often containing an old password of yours that has been compromised in a data-breach and will use email spoofing to make it appear as though it has been sent from your own email account.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/spam-spoofed-emails/">Spam Spoofed Emails</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="gap" style="line-height: 20px; height: 20px;"></div>
	<div  class="wpb_single_image wpb_content_element vc_align_center">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"></div>
		</figure>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2 style="text-align: center;"><strong>Spam Spoofed Emails &#8211; Malicious </strong></h2>
<p>&nbsp;</p>
<p>We have seen an increase in the amount of malicious emails being received by clients, in which the sender claims to have hacked your email account and placed malicious software on your PC to steal your personal information.</p>
<p>These emails can be fairly convincing, often containing an old password of yours that has been compromised in a data-breach and will use email spoofing to make it appear as though it has been sent from your own email account.</p>
<p>This is almost certainly not the case and is a scare tactic used to convince people into sending them large sums of money.</p>
<p>&nbsp;</p>
<h3><strong>“How do they have my password?”</strong></h3>
<p>&nbsp;</p>
<p>With so many different passwords to remember across all of the online services that we rely on daily, many people slip into bad habits and use similar, if not the same password for multiple platforms.</p>
<p>Over the last few years there have been many large-scale data breaches, that have leaked a wide variety of personal information ranging from usernames and passwords to home addresses and dates of birth. Once obtained this information will either be illegally sold or leaked to the masses online via message boards or paste bin sites.</p>
<p>&nbsp;</p>
<h4><strong>“Has my data been compromised?”</strong></h4>
<p>&nbsp;</p>
<p>Prior to the GDPR regulations it was not required for a data processor to notify affected users of a data breach and as such a large majority of the people were and still are unaware that their information has been compromised. The most effective way to find out if you have been affected by a data breach is to use a site called <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">haveibeenpwned</a>, simply pop your email address into the homepage to see if your email is attached to any known data breaches. You can also use this site to check how many times your password has featured in a data breach, this does not necessarily mean you have been affected but can be used as a measurement of password strength and security.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4 style="text-align: center;"><strong>Spoofed emails &amp; Common scams</strong></h4>
<p>&nbsp;</p>
<p>We have seen many different examples of online scams and spam mail. One of the more common ways cyber criminals trick people into paying them is by purchasing domains similar to those used by businesses and then setting up email accounts of employees, usually using information sourced from LinkedIn and company websites.</p>
<p>Recently we had received a report from a company’s accounts department that had been targeted. The scammers had got hold of a domain similar to theirs but with a “1” instead of an “I” in it. They had created an email account mirroring that of the managing director, copying everything including his email signature and email formatting. They had managed to get hold of an old email chain and sent a request for a bank transfer from the company bank account.</p>
<p>Best practice to avoid being caught out by these types of scam is to verify payments made with an authoriser or even the person that has made the request verbally before actioning any transfers. Having a set procedure in place for handling transaction and any deviations from this could be a flag for suspicion.</p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1694001156494" >
		<div class="wpb_wrapper">
			<p><em>Dear User,</em></p>
<p><em>We have installed one RAT software into your device.</em><br />
<em>For this moment your email account is hacked (see on “from address”, I messaged you from your account).</em><br />
<em>Your password for &lt;insert user@domain.com&gt;:&lt;insert a password that you have used&gt;</em><br />
<em>I have downloaded all confidential information from your system and I got some more evidence.</em><br />
<em>The most interesting moment that I have discovered are videos records.</em><br />
<em>I posted my virus on site, and then you installed it on your operation system.</em><br />
<em>When you clicked the button Play on porn video, at that moment my trojan was downloaded to your device.</em><br />
<em>After installation, your front camera shoots video every time, in addition, the software is synchronized with the video you choose.</em><br />
<em>For the moment, the software has collected all your contact information from social networks and email addresses.</em><br />
<em>If you need to erase all of your collected data, send me $xxxx in BTC (crypto currency).</em><br />
<em>This is my Bitcoin wallet: &lt;insert bitcoin wallet address&gt;</em><br />
<em>You have 48 hours after reading this letter.</em><br />
<em>After your transaction I will erase all your data.</em><br />
<em>Otherwise, I will send video with your pranks to all your colleagues and friends!!!</em><br />
<em>And henceforth be more careful!</em><br />
<em>Please visit only secure sites!</em><br />
<em>Bye!</em></p>

		</div>
	</div>
<div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3><strong>“I’ve been compromised what do I do?”</strong></h3>
<p><strong>DO NOT give them any money.</strong></p>
<p>If you pay the ransom you are effectively making this method of scamming profitable, encouraging these individuals to continue phishing/scamming.</p>
<p>&nbsp;</p>
<p><strong>DO NOT respond to the email.</strong></p>
<p>With the nature of this attack/scam, the senders rely on the likelihood that a small amount of the recipients will respond out of the batch of millions.</p>
<p>&nbsp;</p>
<p><strong>Change your passwords attached to the account.</strong></p>
<p>More information on how to create a secure password can be <a href="https://cortecit.co.uk/password-security/">found here</a>.</p>
<p>&nbsp;</p>
<p><strong>Delete the email.</strong></p>
<p>The best thing to do with emails like this are permanently delete them from your inbox.</p>
<p>&nbsp;</p>
<p><strong>Consider setting up 2FA (2 factor authentication).</strong></p>
<p>&nbsp;</p>
<p>More information on 2FA and password security can be <a href="https://cortecit.co.uk/password-security/">found here</a>.</p>
<p><strong> </strong></p>
<p><strong>Purchase spam filtering tools.</strong></p>
<p>&nbsp;</p>
<p>This will not completely stop these types of emails<span style="box-sizing: border-box; margin: 0px; padding: 0px;">; however, it will significantly reduce the number of them that you receive and filter out any malicious emails of other natures, such as <a href="https://cortecit.co.uk/phishing/" target="_blank" rel="noopener">Phishing </a></span>and <a href="https://cortecit.co.uk/ransomware-encryption-viruses/">Ransomware</a>.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="text-align: center;">Please <span style="box-sizing: border-box; margin: 0; padding: 0; text-align: left;">contact our experienced IT support team for any Cyber Security service in Dartford, Kent, South East England. Similarly, you can explore our <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">social media</a> for news, views,</span> and reviews.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/spam-spoofed-emails/">Spam Spoofed Emails</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phishing</title>
		<link>https://cortecit.co.uk/phishing/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 10:40:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.cortecit.co.uk/?p=2792</guid>

					<description><![CDATA[<p>Online Security - Take Action Now! We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender it is better to ignore the email than risk opening it.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/phishing/">Phishing</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_center">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"></div>
		</figure>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1694000795584" >
		<div class="wpb_wrapper">
			<h2 class="align-center" style="text-align: center;"><strong>Phishing Attacks</strong></h2>
<p>&nbsp;</p>
<p class="align-left">Once again, we would like to bring up that all users must be extremely cautious when clicking any form of link or attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender, it is better to ignore the email until you have confirmation that the email is legitimate.</p>
<p>&nbsp;</p>
<h3><strong>What is “Phishing”</strong></h3>
<p>&nbsp;</p>
<p>Phishing is the fraudulent act of sending emails / messages pretending to be from trustworthy companies / individuals with the soul intention being the acquisition of others personal information, such as usernames, emails, passwords, credit card numbers and more. Phishing is thought to constitute one percent of all spam, with spam itself constitutes over half the emails sent on a daily basis.</p>
<p>&nbsp;</p>
<p class="align-left">Phishing is a form of social engineering that is a key weapon within a cyber criminal’s arsenal, the first documented instances of large scale phishing attacks occurred in the mid 90’s and specifically targeted AOL. There are an estimated 150 million phishing emails sent per day and of those it is projected that 15 million make it through spam filters. Of those 15 million emails, 8 million are then opened, and 800 thousand are clicked / interacted with.</p>

		</div>
	</div>
<div class="hr-thin style-line" style="width: 100%;border-top-width: 1px;"></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1694000228078" >
		<div class="wpb_wrapper">
			<h4 class="align-center" style="text-align: center;"><strong>How to recognise a phishing email</strong></h4>
<p>&nbsp;</p>
<p><em>The spelling, grammar and mail structure</em><br />
Often, the structure of an email is the first way that you can spot whether an email is a phishing email or not. The writing style / typeface is likely to appear different to how it is usually written from the original sender, even in the slightest way e.g. Font type, Font size, text spacing and general structure.</p>
<p>Within a professional setting, individuals tend to take communications very seriously, and often proof-read and grammar / spelling check their messages before being sent out. As such it is unlikely that the email came from the original source if an email is packed with spelling and grammar mistakes.</p>
<p><em>Strange URLs</em><br />
A phishing email will almost always include some form of link that directs you to a site asking for login details or personal information. Checking the URL is often overlooked as the link will often take you to a webpage that is built to replicate the origin site. A common example is a false security warning email from someone claiming to be Microsoft that requests you to log in and verify your account. If the link is clicked it will take you to a webpage that is designed to replicate the official Microsoft login page.</p>
<p><em>Exclusion of personal information</em><br />
If you are addressed generically e.g. “Dear Sir/Madam” or “Dear Customer” as opposed to being addressed by name or department, it is possible that the email is not from a genuine source and has been sent out in bulk to multiple people.</p>
<p><em>Alarming / unusual content</em><br />
A large majority of the time phishing emails are written to trick someone into clicking links out of excitement or fear. Some common examples are winning a prize or claiming that your account is not secure. The user will then input personal information/emails and passwords without thinking the consequences through.</p>
<p><em>“But it came from someone I know?&#8221;</em><br />
A large number of phishing emails are sent from email accounts that have previously been compromised. This makes it easier to trick people, as the email comes from someone they know. Just because an email comes from a client, friend, supplier etc… all of the above still applies. If the email does not look correct, asks you to login somewhere or asks you for money you should contact the person, to confirm legitimacy of the email.</p>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1694000367709" >
		<div class="wpb_wrapper">
			<p>In conclusion, In phishing, you receive emails pretending to be from trustworthy people or companies to gain others&#8217; personal information. Please keep in touch with our IT support team for any <a href="https://cortecit.co.uk/cyber-security/">cyber security service</a> in Dartford, Kent, South East England. Similarly, you can explore our <a href="https://www.linkedin.com/company/cortecit/" target="_blank" rel="noopener">social media</a> for news views and reviews on Common cyber threats and how to help prevent them.</p>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div></div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/phishing/">Phishing</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Director Fraud and Online Security</title>
		<link>https://cortecit.co.uk/director-fraud-online-security/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 14:24:03 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.cortecit.co.uk/?p=2577</guid>

					<description><![CDATA[<p>Online Security - Take Action Now! We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender it is better to ignore the email than risk opening it.</p>
<p>The post <a rel="nofollow" href="https://cortecit.co.uk/director-fraud-online-security/">Director Fraud and Online Security</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1 style="text-align: center;"><strong>Director Fraud and Online Security</strong></h1>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>We would like to reiterate that all users must be very careful when clicking any form of link be it a link to an unknown website or an attachment embedded within an email. If the sender is unknown or you feel that the email is not actually from the stated sender, it is better to ignore the email than risk opening it.</p>
<p>Fake emails or emails containing fake links &amp; attachments are routinely used to gain access to small business accounts or banking information. Anti-virus and Anti-spam will stop most, but users also have a vital role to play. One example we frequently see is that a suspect email will contain a web link that will ask for your email password. This will then be used to commit banking fraud and other problems. Be extremely careful of any links you receive via email, and never enter your email password into a web page. You can always call us if you receive an email you&#8217;re not sure about or if you are being asked for your email password by a web page.</p>

		</div>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div><div class="hr-thin style-line" style="width: 100%;border-top-width: 1px;"></div><div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2><strong>Director Fraud &#8211; Director Fraud Protection in Kent</strong></h2>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>We have noticed an increase in spoof emails claiming to be company directors and managers emailing other members of staff asking them to transfer money or for information that could be used by fraudsters to commit banking fraud. Online fraudsters are becoming ever-more sophisticated, and will stop at no end.</p>
<p>There are many instances of fraudster registering domains designed to be extremely similar to a targeted company and using public records such as a Companies House or companycheck to find out company directors names and information so that they can set up fake email accounts in their names. Our support desk are happy to discuss possible bad emails before they are opened, in this way users can gain an understanding of what to look for.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4><strong>Most common types of scam emails:</strong></h4>
<p>&nbsp;</p>
<ul>
<li>Someone will pose as a boss or director of a company instructing a member of staff to deposit into the fraudulent account.</li>
<li>Fraudsters will often pose as the IT company of a bank saying they will need to make a series of test transfers.</li>
<li>They will claim to be a supplier or business partner asking for fake outstanding invoices to be paid into a new bank account.</li>
</ul>

		</div>
	</div>
<div class="gap" style="line-height: 20px; height: 20px;"></div><div class="hr-thin style-line" style="width: 100%;border-top-width: 1px;"></div><div class="gap" style="line-height: 10px; height: 10px;"></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>If you have any questions, you can talk to us about possible ways to improve your <a href="https://cortecit.co.uk/cyber-security/">cyber security</a> and help put measures in place to reduce the chance of successful fraudulent attacks. </strong></p>

		</div>
	</div>
<div class="gap" style="line-height: 40px; height: 40px;"></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3 style="text-align: center;" data-start="222" data-end="304">How to Ensure You’re Protected from Director Fraud &amp; Online Security Threats</h3>
<p>&nbsp;</p>
<p data-start="306" data-end="549">Cybercriminals are increasingly targeting directors and senior staff using sophisticated scams like impersonation, invoice fraud, and business email compromise (BEC). Protecting your organisation starts with awareness and proactive procedures.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3 data-start="551" data-end="584"></h3>
<ul data-start="1468" data-end="1917">
<li data-start="586" data-end="804">
<p data-start="588" data-end="804"><strong data-start="588" data-end="632">Train All Staff – Not Just Finance Teams</strong><br data-start="632" data-end="635" />Everyone in your organisation should be aware of the risks of director fraud, not just your accounting or finance departments. Awareness is your first line of defence.</p>
</li>
<li data-start="806" data-end="1003">
<p data-start="808" data-end="1003"><strong data-start="808" data-end="852">Verify Manager &amp; Director Communications</strong><br data-start="852" data-end="855" />Create a clear, company-wide policy for verifying any requests from directors—especially if they involve financial transactions or sensitive data.</p>
</li>
<li data-start="1005" data-end="1219">
<p data-start="1007" data-end="1219"><strong data-start="1007" data-end="1053">Use Two-Step Verification for Transactions</strong><br data-start="1053" data-end="1056" />Require a two-step approval process for all financial transactions. This could range from a shared security phrase to verbal confirmation via phone or in-person.</p>
</li>
</ul>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong data-start="1223" data-end="1264">Review All Transactions for Red Flags</strong><br data-start="1264" data-end="1267" />Always double-check for irregularities in payment requests—such as slight misspellings in company names, unfamiliar bank details, or unusual email formats.</li>
<li data-start="1470" data-end="1700"><strong data-start="1470" data-end="1517">Audit Public Information About Your Company</strong><br data-start="1517" data-end="1520" />Review what&#8217;s publicly available on platforms like Companies House, your website, and social media. Remove or limit details that could be used in phishing or impersonation scams.</li>
<li data-start="1704" data-end="1917"><strong data-start="1704" data-end="1741">Ensure Robust IT Security Systems</strong><br data-start="1741" data-end="1744" />Confirm that all your devices and systems are protected with up-to-date antivirus, anti-malware, and spam filters. Secure email systems are essential for fraud prevention.</li>
</ul>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div id="attachment_14945" style="width: 1210px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-14945" class="wp-image-14945 size-full" src="https://cortecit.co.uk/wp-content/uploads/2018/03/Director-Fraud-and-Online-Security.jpg" alt="Director Fraud and Online Security" width="1200" height="675" srcset="https://cortecit.co.uk/wp-content/uploads/2018/03/Director-Fraud-and-Online-Security.jpg 1200w, https://cortecit.co.uk/wp-content/uploads/2018/03/Director-Fraud-and-Online-Security-300x169.jpg 300w, https://cortecit.co.uk/wp-content/uploads/2018/03/Director-Fraud-and-Online-Security-1024x576.jpg 1024w, https://cortecit.co.uk/wp-content/uploads/2018/03/Director-Fraud-and-Online-Security-768x432.jpg 768w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /><p id="caption-attachment-14945" class="wp-caption-text">Director Fraud and Online Security</p></div>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>At Cortec IT, we offer tailored cybersecurity solutions designed to protect company directors and senior executives from targeted cyber threats. From endpoint protection to employee awareness training and advanced email security systems, our team is ready to defend your business.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>Worried about director-targeted fraud?</strong><br />
Contact Cortec IT for a free security assessment and find out how we can help secure your leadership and critical business data.<br />
Call us : 020 8467 9222</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Finally, if you have any questions or concerns about your organisation’s security, our expert team is here to help. We’ll work with you to identify vulnerabilities, implement effective measures, and reduce the risk of director fraud and cyberattacks.  Contact us today to discover how we can support your business with smart, secure <a href="https://cortecit.co.uk/national-technology-day/">technology solutions</a>. And if you&#8217;d like to stay informed about our latest services, security tips, and technology updates, follow us on <a href="https://uk.linkedin.com/company/cortecit" target="_blank" rel="noopener">social media</a>, it&#8217;s a great way to stay connected.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/director-fraud-online-security/">Director Fraud and Online Security</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are you ready for GDPR?</title>
		<link>https://cortecit.co.uk/gdpr/</link>
		
		<dc:creator><![CDATA[cortec]]></dc:creator>
		<pubDate>Thu, 26 Oct 2017 15:27:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.cortecit.co.uk/?p=2248</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://cortecit.co.uk/gdpr/">Are you ready for GDPR?</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1 style="text-align: center;">Are you ready for GDPR?</h1>
<p>&nbsp;</p>
<p>General Data Protection Regulation, or GDPR, will overhaul how businesses process data. This regulation is the biggest change in two decades and will come into force on <strong>May 25th 2018.</strong> It will change how businesses and public sector organisations can handle the information of customers. The GDPR is Europe&#8217;s new framework for data protection laws – it replaces the 1995 data protection directive, which current UK law is based upon.</p>
<p>&nbsp;</p>
<h2>How does GDPR affect?</h2>
<p>&nbsp;</p>
<p>If your company either controls or processes personal data you will be affected by the new regulations. If you are subject to the Data Protection Act, you will also be subject to the GDPR. Personal data broadly means a piece of information that can be used to identify a person, name, address, IP address, the list is endless. In the <strong><span style="color: #000000;"><a style="color: #000000;" href="https://commission.europa.eu/law/law-topic/data-protection_en" target="_blank" rel="noopener">full details of GDPR</a></span> </strong>there are 99 articles that set out the rights of individuals and the obligations companies have. These include allowing people to have easier access to data that companies hold about them, new fines and a clear responsibility for organisations to obtain consent from people they collect information about.</p>
<p>From a company perspective you will be more accountable for the handling of people&#8217;s information. This includes having data protection policies, impact assessments and relevant documents on how you process data. The Information Commissioner&#8217;s Office (ICO) has to be told about any data breach 72 hours after you find out about it, as do all people it has affected.</p>
<p>&nbsp;</p>
<h2><span style="text-decoration: underline;"><strong>What do I need to do?</strong></span></h2>
<p>&nbsp;</p>
<p>GDPR will vary from business to business, To help prepare for the start of GDPR, the ICO has produced a <span style="color: #000000;">12-step guide</span> which we recommend you read. The guide, covers steps from making senior business leaders aware of the regulations, working out which information is held, updating your procedures and what happens in the case of a data breach. If you are unsure about your obligations under the new regulations, our advice is to seek out professional legal advice to safe guard your company. It is your responsibility to ensure your company is ready for GDPR, For existing clients Cortec can implement technical solutions and advice that will help you reach compliance. If you would like to book a consultation slot with us please email: <span style="color: #000000;"><strong><a style="color: #000000;" href="mailto:gdpr@cortecit.co.uk">gdpr@cortecit.co.uk</a></strong>.</span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="text-align: center;">Finally, please contact us today and learn how we can help you boost your business with <a href="https://cortecit.co.uk/top-10-reasons-to-outsource-your-businesses-it/">new technology</a>.<br />
And if you want to keep in touch with our services and Technology-related news, please follow our <a href="https://www.linkedin.com/company/cortecit" target="_blank" rel="noopener">social media</a>.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a rel="nofollow" href="https://cortecit.co.uk/gdpr/">Are you ready for GDPR?</a> appeared first on <a rel="nofollow" href="https://cortecit.co.uk">Cortec IT Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
