SHOCK STAT: A third of business owners don’t trust their staff
Do you trust your employees with sensitive business data? You might be shocked to learn how many business owners don’t. But why… ? We have the answers.
Do you trust your employees with sensitive business data? You might be shocked to learn how many business owners don’t. But why… ? We have the answers.
They say you can’t teach an old dog new tricks, but what happens when it’s a young pup that needs training? New research on people under 40 has revealed a scary attitude towards cyber security. We tell you more here.
The most likely targets for all sorts of cyber attacks are small and medium sized businesses. They don’t have the budgets for dedicated staff or numerous layers of protection.
But the weakest link in any security chain is your staff.
Good cyber security awareness training is essential for everyone in your business.
You will need a strategy to start with.
How many times a day do you respond to an email without really thinking about its contents?
Maybe it’s a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you’ve fallen victim to a Business Email Compromise (BEC) attack.
A BEC attack occurs when a cyber criminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.
It might sound like something that only happens to big corporations, but that’s not the case.
According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than £20 billion over the past few years.
And Microsoft brings more bad news, with its recent findings showing that they’re getting both more destructive and harder to detect.
One day it could save your business
Backing up your data is one of the strongest precautions you can take. Set it up properly and make it part of your routine to check that it’s working. Because one day your backup could save your business.
We all hope disasters will never happen.
But of course they can, and do. So it’s best to be prepared. That’s why a reliable backup system is one of the most important protections you can put in place.
Where do you start? Watch our latest video for some expert advice.
Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go.
They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge.
The security risk of “juice jacking” was long thought to be more theoretical than real, but the tech needed to carry out an attack has got smaller and cheaper and easier to use. This means less sophisticated criminals are now turning their hand to it.
So how does it work?
With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals. They’re looking to access your information, disrupt your business, or hold your data to ransom.
Tens of millions of attempted malware attacks were discovered throughout this year, and a massive 95% of those threats were targeted at Windows.
The vast majority of attacks are unsuccessful, but those that do succeed can create havoc for the affected businesses. So you need to be sure that you’re taking all possible precautions to protect your business and your data.
When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom.
But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.
Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).
Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.
Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.
I am pleased to announce that tKnowIT Limited has achieved Cyber Essentials certification for a further year.
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
OKLearn moreWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
The following cookies are also needed - You can choose if you want to allow them:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy