The Danger of Business Email Compromise (BEC)

The Danger of Business Email Compromise (BEC)

The Danger of Business Email Compromise (BEC) Business Email Compromise attacks rose by 81% in 2022, mainly as employees fail to report the threat. Email has become an essential part of our daily lives, and its used for various reasons, one being for business....
Are You Using too Many Apps? – App Fatigue

Are You Using too Many Apps? – App Fatigue

Are You Using Too Many Apps? Ever thought you might be using too many apps? This is an actual thing, called App Fatigue and it can actually cause some security issues. In today’s digital age, it seems like there’s an app for everything. From social media...
The 5 Biggest Cyber Security Myths

The 5 Biggest Cyber Security Myths

The 5 Biggest Cyber Security Myths People are always making incorrect assumptions, and when it comes to Cyber Security, these assumptions can be crucial for businesses. Here are 5 Cyber Security myths and assumptions that people are getting completely wrong. 1. YOUR...
5 Most Common Types of Phishing Scams

5 Most Common Types of Phishing Scams

5 Most Common Types of Phishing Scams Hackers are always hunting for new ways to try and trick victims. Over many years, we’ve seen multiple types of phishing scams and in this blog, we go through the 5 most common, that you might see on a weekly basis. Email...