In the Spotlight – Huntress Managed Detection and Response (MDR)
At Stratus Blue, we exist to give businesses the freedom to be remarkable, and we
It is a matter of fact that technology has a large role in our day to day lives. And with the separation of work forces and the activity of working remotely – using home security and home internet services, away from the workplace environment – today’s cyber criminals are more empowered than ever before.
Whether for political reasons, financial or personal gain, hackers can use their skills to disrupt businesses and organisations. Here are some of the types of attacks that could affect your business at any time.
In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organisation or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organisation’s network.
Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organisation. For example, an attacker may send an email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts.
Phishing attacks may also appear to come from other types of organisations, such as charities or utilities suppliers. Attackers often take advantage of current events and certain times of the year, such as
You can check your own security passwords at www.haveibeenpwned.com to see if your email credentials have been compromised. Other checks, such as dark web analysis, can be done by a recognised and registered managed security provider.
Employing some of these simple practices will go a long way to avoiding cyberattacks. However, nothing is full-proof when it comes to securing your online content. Most people put themselves at risk as a result of poor practices and simple mistakes which can be easily guarded against.
Make sure you continue being kept up to date for potential threats and educate your colleagues against these threats.
Working with a trusted IT partner can help you remain vigilant and ensure that you continue to enjoy a safe and enjoyable online experience and letting you get on with what you do best – growing your business.
At Stratus Blue, we exist to give businesses the freedom to be remarkable, and we
Business continuity is the ability of a business to continue operating critical business functions during
As we approach International Women’s Day I have been thinking about my role as a Chief