Security
How Microsoft Will Block Macros To Stop Malware
Microsoft recently announced that it will be blocking Visual Basic for Applications (VBA) macros by default as a way to stop the spread of malware. Since these macros are important automation tools for Microsoft Office apps, how is this going to work? What Are Visual Basic for Applications (VBA) Macros? Visual Basic for Applications (VBA)…
Read MoreEuropean Oil Facilities Targeted By Cyber Attacks
In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware,…
Read MoreTech Insight : What Is A ‘Watering Hole’ Attack?
In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…
Read MoreFeatured Article: How To Stop Your Emails From Ending Up In Spam Filters
In this article, we look at how spam filers work and what can be done to ensure that our legitimate emails reach their target and aren’t wrongly filtered out as ‘spam’ . Why We Need Spam Filters Although we’re focusing on how to avoid spam filters, it’s worth noting how important they are to businesses.…
Read MoreSecurity Stop Press : Backdoors Discovered In Dozens Of WordPress Themes And Plugins
It has been reported that 40 themes and 53 plugins belonging to AccessPress Themes, a Nepal-based company were backdoored with malicious code in the first half of September 2021. It is believed that the infected extensions gave attackers full access to sites, and that access also appears to have been sold to operators of spam…
Read MoreThe Essentials Of A ‘BYOD’ Policy
In this article, we look at what BYOD is, why a BYOD policy is important, and what elements form the essential blueprint of a BYOD policy. What Is BYOD? The term Bring Your Own Device (BYOD) has been around since 2004 when it was first coined as an expression. With BYOD, employees can bring and…
Read MoreChristmas Cons
In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes…
Read MoreEmail Security
In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email,…
Read MoreDigital Markets Act Could Protect Whistleblowers
The EU’s adoption of a proposal on the Digital Markets Act (DMA) on Tuesday not only offers the potential to help tackle the market dominance of big tech businesses but could also protect whistleblowers. What Is The Digital Markets Act? Currently at the proposal stage, the Digital Markets Act (DMA) from the European Commission is…
Read MoreMassive Rise In HTTPS Attacks
The latest “ThreatLabz: The State of Encrypted Attacks,” 2021 report has shown a 300 per cent increase in online attackers using HTTPS to cloak their activities and blend in with other traffic. HTTPS HTTPS, the encrypted version of the Hypertext Transfer Protocol (HTTP), enables secure communication over a computer network, using Transport Layer Security (formerly,…
Read More