How Microsoft Will Block Macros To Stop Malware

Microsoft recently announced that it will be blocking Visual Basic for Applications (VBA) macros by default as a way to stop the spread of malware. Since these macros are important automation tools for Microsoft Office apps, how is this going to work? What Are Visual Basic for Applications (VBA) Macros? Visual Basic for Applications (VBA)…

Read More

European Oil Facilities Targeted By Cyber Attacks

European Oil Facilities Targeted By Cyber Attacks

In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware,…

Read More

Tech Insight : What Is A ‘Watering Hole’ Attack?

What Is A 'Watering Hole' Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…

Read More

The Essentials Of A ‘BYOD’ Policy

In this article, we look at what BYOD is, why a BYOD policy is important, and what elements form the essential blueprint of a BYOD policy. What Is BYOD? The term Bring Your Own Device (BYOD) has been around since 2004 when it was first coined as an expression. With BYOD, employees can bring and…

Read More

Christmas Cons

In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes…

Read More

Email Security

In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email,…

Read More

Digital Markets Act Could Protect Whistleblowers

The EU’s adoption of a proposal on the Digital Markets Act (DMA) on Tuesday not only offers the potential to help tackle the market dominance of big tech businesses but could also protect whistleblowers. What Is The Digital Markets Act? Currently at the proposal stage, the Digital Markets Act (DMA) from the European Commission is…

Read More

Massive Rise In HTTPS Attacks

The latest “ThreatLabz: The State of Encrypted Attacks,” 2021 report has shown a 300 per cent increase in online attackers using HTTPS to cloak their activities and blend in with other traffic. HTTPS HTTPS, the encrypted version of the Hypertext Transfer Protocol (HTTP), enables secure communication over a computer network, using Transport Layer Security (formerly,…

Read More