Tech Insight : What Is A ‘Watering Hole’ Attack?

What Is A 'Watering Hole' Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…

Read More

The Essentials Of A ‘BYOD’ Policy

In this article, we look at what BYOD is, why a BYOD policy is important, and what elements form the essential blueprint of a BYOD policy. What Is BYOD? The term Bring Your Own Device (BYOD) has been around since 2004 when it was first coined as an expression. With BYOD, employees can bring and…

Read More

Christmas Cons

In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes…

Read More

Email Security

In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email,…

Read More

Digital Markets Act Could Protect Whistleblowers

The EU’s adoption of a proposal on the Digital Markets Act (DMA) on Tuesday not only offers the potential to help tackle the market dominance of big tech businesses but could also protect whistleblowers. What Is The Digital Markets Act? Currently at the proposal stage, the Digital Markets Act (DMA) from the European Commission is…

Read More

Massive Rise In HTTPS Attacks

The latest “ThreatLabz: The State of Encrypted Attacks,” 2021 report has shown a 300 per cent increase in online attackers using HTTPS to cloak their activities and blend in with other traffic. HTTPS HTTPS, the encrypted version of the Hypertext Transfer Protocol (HTTP), enables secure communication over a computer network, using Transport Layer Security (formerly,…

Read More

Scam Calls : A Significant Update

This week, we heard the good news that the big phone networks have agreed to automatically block foreign scam calls, and we heard the bad news that an Ofcom survey has revealed that 45 million people in the UK were targeted by scam text messages or phone calls this summer! The Challenge The challenge has…

Read More

How To Tell If You’re Being Spoofed

Many cybers attacks now take the form of using fake/spoof communication to trick victims into parting with personal (or company) data, or money. We take a look at some of the most popular and widely reported methods and how to avoid falling victim to them. Phishing This is a very common form of spoofing attack.…

Read More