Grant McGregor Blog
Posts about

phishing

How Phishing Got Social

How Phishing Got Social

There’s a new attack vector in town: social media. Social is currently the fastest-growing type of phishing attack. Here’s what you need to know. We’ve covered phishing many times here on the Grant McGregor blog. We think it’s important to do so, because we all need to stay vigilant against the...

Read More

Are you doing enough to protect your staff against Phishing?

Are you doing enough to protect your staff against Phishing?

In IT, we talk a lot about protecting our systems and data against cyber-attack. However, there is a growing realisation that this is only part of the picture. We need to do much more to protect our people too.

Read More

The 10 Phishing Red Flags Your People Need to Know About Right Now

The 10 Phishing Red Flags Your People Need to Know About Right Now

Phishing is the most pernicious type of cyber-attack. While you can stop some phishing attempts with your security tools, it’s almost inevitable that some will reach their intended targets. This means educating your people has to be a key plank in any phishing defence strategy.

Read More

Attention: How You’re Being Researched by Cyber Criminals

Attention: How You’re Being Researched by Cyber Criminals

We might think we know about the perils of social media: distraction from real life, difficulty switching off, anxiety, FOMO (fear of missing out) and heightened stress. But this misses perhaps the most dangerous peril: the use of the information you share by cyber criminals who want to target you.

Read More

The New Rules for Passwords in 2019

The New Rules for Passwords in 2019

Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

Read More

From Spam to Phish – Cyber Crime on a Plate

From Spam to Phish – Cyber Crime on a Plate

Email – love or hate it as a form of communication, it touches most of us everyday and shows no signs of going away. This is especially true in the workplace where it hasn’t yet been dislodged by the various messaging apps as the preferred medium to send information.

Read More

Office 365 Popularity Grows…as does its potential vulnerability

Office 365 Popularity Grows…as does its potential vulnerability

Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.

Read More

How Do You Stop a Phishing Attack?

How Do You Stop a Phishing Attack?

People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.

Read More

You’re Not Too Small to Be a Victim: The Obvious IT Security Fails Small Businesses Can Avoid

You’re Not Too Small to Be a Victim: The Obvious IT Security Fails Small Businesses Can Avoid

 

Read More

The Rise of Personally-Targeted Spear-Phishing Attacks & How to Defend Yourself From Them...

The Rise of Personally-Targeted Spear-Phishing Attacks & How to Defend Yourself From Them...

As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.

Read More

Categories

see all