What is quishing and how can you protect your business?
CyberSmart Blog
by Rob S
1w ago
Quishing or QRishing is a type of phishing scam that uses QR codes to trick victims into downloading malware or sharing personal data. Despite its unthreatening name, quishing poses a real risk to businesses. However, with the right knowledge, you can stop your business from falling prey to these attacks, read on for everything you need to know.  Why QR codes?  Read most media and you’ll see plenty of stories about the security threat posed by AI or the latest nation-state attack. However, cybercrime doesn’t have to involve the latest tech or be the height of nefarious sophistication ..read more
Visit website
Anti-virus vs Anti-malware: what’s the difference?
CyberSmart Blog
by Rob S
3w ago
Antivirus and anti-malware are the basic building blocks for any small and medium enterprise’s (SME) cybersecurity strategy. They’re the most well-known cybersecurity tools, and it’s rare to find a business that doesn’t use one. But do you know what they protect you from, the difference between an antivirus and an anti-malware, and whether you need both? Let’s explore these key talking points. Malware vs viruses Before discussing the merits of the two types of software, we must tackle the difference between viruses and malware. Most people assume that the two things are synonymous. Isn’t ‘viru ..read more
Visit website
Malware-as-a-Service and the rise of DIY cybercrime
CyberSmart Blog
by Rob S
1M ago
Cybercriminals are always looking for the next sophisticated method to target businesses. And as a small business owner, it can sometimes feel impossible to keep up with the latest developments. However, knowledge is power, which is why we bring you regular updates. Let’s explore the latest trends in DIY cybercrime and Malware-as-a-Service, and how to mitigate them.  What is Malware-as-a-Service? Malware-as-a-Service (MaaS) is a business model used by cybercriminals known as MaaS operators. MaaS operators lease their software, hardware, and related infrastructure to others for a fee ..read more
Visit website
What is a banking trojan and how do you stop one?
CyberSmart Blog
by Rob S
2M ago
Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound like Marvel supervillains, they’re all examples of high-profile banking trojans. Emerging in the mid-noughties, banking trojans have morphed into one of the most dangerous SME cybersecurity threats. But what are banking trojans? And how can you protect your business from them? What is a banking trojan? A banking trojan is a particularly nasty form of trojan horse malware that aims to give cybercriminals access to networks and confidential information stored in online banking systems. Banking trojans typically come in ..read more
Visit website
How nation-state cyber warfare affects you
CyberSmart Blog
by Rob S
2M ago
We live in a time of increased international tensions. You can scarcely open a newspaper or browse a news site without being greeted by conflict, both in the real world and online. We’re only two months into 2024 and the National Cyber Security Centre (NCSC) and its international partners have already issued a public warning about state-sponsored attackers. However, for the average small business or individual, this can seem very distant. Reports on the machinations of states and their security services can all feel ‘a bit James Bond’. Nevertheless, cyber warfare affects everyone. In this blo ..read more
Visit website
Demystifying malware: The 5 stages of a malware attack
CyberSmart Blog
by Rob S
2M ago
Malware is almost as old as the first personal computers. And like anything that’s existed for a long time, it’s easy to become complacent about it.  However, if your business has ever fallen victim to a malware attack, you’ll know how damaging it can be. The repair costs alone can set you back thousands; then, there’s the indirect financial impact of prolonged business disruption, data loss, and reputational damage. Yet, it’s not all doom and gloom. Armed with a little understanding, you can prepare your prepare your business and stay safe online. To help you do this, we’ve put together ..read more
Visit website
What is a remote access takeover?
CyberSmart Blog
by Rob S
2M ago
Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4 million cases of fraud in the first half of 2023 with criminals stealing over £580 million. And worming its way into these figures, comes a growing threat – remote access takeovers. In this blog, we’ll deal with the what and the how of remote access scams, including how to avoid falling foul of them. Read on to find out more. How does a remote access scam work? A remote access takeover is a form of identity theft. The principle is a simple one. Usually, the fraudster will pose as a legitimate contact, say a custo ..read more
Visit website
What is fileless malware and how can you safeguard your systems?
CyberSmart Blog
by Rob S
3M ago
The most elusive of all malware; fileless malware is a threat you can’t afford to let slip off your radar. It accounts for 40% of global malware, according to research from Arctic Wolf Labs. And attacks increased by an eye-watering 1,400% between 2022 and 2023.  The next time you’re assessing cybersecurity priorities, keep protecting your business from these furtive attacks front of mind.  What is fileless malware? Fileless malware is malicious code that’s written to your RAM or legitimate system tools rather than your disk (SSD or hard drive). Essentially, it uses your system’s soft ..read more
Visit website
Why small businesses are at greater risk of malware attacks
CyberSmart Blog
by Rob S
3M ago
Malware attacks are a well-known concern for businesses, but what type of business is more at risk? Small businesses are just as at risk as large enterprises. In fact, 54% of SMEs reported experiencing between one to five cyberattacks in a 12-month period.  Let’s explore why.  Small businesses and malware attacks Small and medium-sized businesses (SMEs) are less likely to have robust protocols in place to mitigate a malware attack. They might not be aware of the risks, understand what a malware attack looks like, or have the ability to react if one occurs. And cybercriminals take adv ..read more
Visit website
Lessons from a breached email and inheritance theft
CyberSmart Blog
by Adam Pilton
3M ago
We all spend almost every day plugged into our emails. For most of us, this is our primary source of communication with the rest of the world – whether for work or our personal lives. However, despite its utility, email communications can have a darker side. This blog will help answer what threats exist, why email security matters, and, most importantly, what can be done to defend against these threats. Plus, we will look at a real-life case in which email was used to steal hundreds of thousands of pounds. What vulnerabilities could exist in my email security? So, what vulnerabilities could ex ..read more
Visit website

Follow CyberSmart Blog on FeedSpot

Continue with Google
Continue with Apple
OR