Select Page

Blog

The CybSafe blog is a collection of stories, updates and guidance for people-centric security professionals.

 

The two most common phishing scams that affect UK businesses

The two most common phishing scams that affect UK businesses

Phishing scams evolve constantly. Don’t they?

On the one hand, yes. Sophisticated cyber criminals are very much aware that, once a phishing scam becomes well known, its potency falls. So, over time, phishing scams adapt and evolve.

On the other hand, the the nuts and bolts of phishing scams are surprisingly static. On the whole, phishing attacks are quick, cheap and disastrously effective. Knowing this, criminals rarely tweak the inner workings of their phishing scams all that much.

read more
Phishing filters, can phishing be prevented?

Phishing filters, can phishing be prevented?

As phishing filters are far from perfect, can phishing ever really be prevented?

Today, with phishing attacks on the rise and the cyber threat landscape constantly evolving, most companies employ some form of technological phishing filter to help prevent phishing.

Such filters typically rely on machine learning to check and categorise incoming emails and, after doing, prevent suspicious emails from making it into corporate inboxes.

read more
How to identify a phishing email

How to identify a phishing email

You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email could be a phishing scam – no matter what it looks like. How do you check whether or not the email is a phishing attack? How to identify phishing...

read more
Why are phishing attacks successful?

Why are phishing attacks successful?

Phishing attacks often seem rudimentary. With their spelling and grammar errors, blurry replicas of company logos and conspicuous twists on sender names, they should be easy to spot, shouldn’t they? So why is it, instead of dying down, phishing attacks are on the...

read more
How are phishing attacks used in identity theft?

How are phishing attacks used in identity theft?

People are more likely to be a victim of identity theft than any other type of cybercrime… and phishing can be a precursor In order to steal your identity, criminals need to get hold of your personal information. That’s all it really takes to begin opening bank...

read more
Are phishing attacks on the rise?

Are phishing attacks on the rise?

In 2018, some reports suggest the number of phishing attacks are falling. Is that really the case? Phishing attacks have been on the rise for a long time now. According to the UK government’s most recent cyber security breaches survey, they cause more data breaches...

read more
Security Awareness Training: The Old Definition and the New

Security Awareness Training: The Old Definition and the New

At the time of writing, Google tells us security awareness training is “a formal process for educating employees about computer security.”You can bet it’s a prevalent definition: the search engine sifts through every indexed web page ever written on the topic to return the single, succinct and simple sentence.

read more
Insights from 22 cyber security experts – part 1

Insights from 22 cyber security experts – part 1

22 expert speakers offered actionable and practical advice on the most pressing issues facing the security industry today. For those who couldn’t make it, here’s what you missed on the first three days. You can now get immediate access to all 22 PeepSec talks by simply registering for free here.

read more