Select Page

ABC+

Articles on security awareness, behaviour and culture.

 

Six security essentials for those working from home

Six security essentials for those working from home

The COVID-19 outbreak is promoting remote working. Here’s how to minimise cyber risk when working from home   1. Use company-approved devices Mental blueprints dictate how we behave in any given situation. Our blueprints might prompt us to use personal laptops...

read more
How to identify a phishing email

How to identify a phishing email

You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email could be a phishing scam – no matter what it looks like. How do you check whether or not the email is a phishing attack? How to identify phishing...

read more
Why are phishing attacks successful?

Why are phishing attacks successful?

Phishing attacks often seem rudimentary. With their spelling and grammar errors, blurry replicas of company logos and conspicuous twists on sender names, they should be easy to spot, shouldn’t they? So why is it, instead of dying down, phishing attacks are on the...

read more
How are phishing attacks used in identity theft?

How are phishing attacks used in identity theft?

People are more likely to be a victim of identity theft than any other type of cybercrime… and phishing can be a precursor In order to steal your identity, criminals need to get hold of your personal information. That’s all it really takes to begin opening bank...

read more
Are phishing attacks on the rise?

Are phishing attacks on the rise?

In 2018, some reports suggest the number of phishing attacks are falling. Is that really the case? Phishing attacks have been on the rise for a long time now. According to the UK government’s most recent cyber security breaches survey, they cause more data breaches...

read more