Protection

Blog categorized as Protection

Invoicing fraud is growing at an alarming rate. It occurs when a customer is fraudulently led to believe that a payment needs to be made for goods or a service into the wrong account.

This is done by duping the customer (victim) to change bank details on their system. This can be done telephonically ...

02.04.20 08:12 PM - Comment(s)

What is phishing?

Phishing is any fraudulent attempt to obtain confidential information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in electronic communication.

PHaaS (Phishing as a Service) allows organizations to determine a baseline for susceptibility...

22.10.19 04:12 PM - Comment(s)

It’s a no-brainer to enable multi factor authentication when using Office 365 , or for any other platform. There are just way too many password breaches, phishing attempts and other attack vectors that will allow attackers to gain access to an account with a password.


Microsoft have made it super sim...

16.08.18 09:35 PM - Comment(s)

Tags