phishing

phishing Archives

IT department, IT professional, information technology, layers

Australian businesses boosting their cybersecurity spending

Over two-thirds of Australian businesses have allocated part of their IT budget to AI-driven cybersecurity measures.

Reinforcing business security: The imperative of cybersecurity and the unmatched efficacy of Kensington’s Fingerprint Security Keys

The VeriMark Fingerprint Keys provide an additional multi-factor authentication and can be integrated with password mana...

Is your small business protected from cybercrime?

Don't wait any longer - while there are many perks to being your own boss, protecting your business from cybercrime can ...

Why small businesses need to reconsider their social media posts

To prevent potential attacks from social media use, businesses should have strong social media guidelines for staff and ...
blind spot

Research reveals extent of SMEs’ vulnerability to cyberattacks

As a result of cyberattacks 25 per cent of SMEs have lost data, 17 per cent had to shut operations until the issue was f...
cyber attack, vulnerable, cyber criminals, myths, cyber threat

The cybersecurity share economy: how to help SMEs most at risk

BlackBerry's 2022 Threat Report found that SMEs suffered about 13 threats per device per annum, far more than larger ent...

Pressure to pay: the top 10 tactics employed by ransomware adversaries

Ransomware attackers’ behaviour is shifting from technical attacks targeting systems and data, to targeting people and u...
cyber attack, vulnerable, cyber criminals, myths, cyber threat

Cyber threats for SMEs to watch out for in 2022

For many, an online presence may be a completely new venture, which often means technical vulnerabilities and unsecured ...
financial review

Why SMEs should conduct an in-depth half-year financial review

The half-yearly review gives SMEs the opportunity to truly reflect on business performance in the first half of the fina...
internet, disaster

Keeping your small business cyber-safe through backup

Data protection is all about risk mitigation - is the data part of a critical application, and how does that data tie i...