Posted on 27 June 2023 by
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized users access to company systems. With the growth in AI tools recently, phishing attempts are […]
Posted on 08 March 2023 by
In a previous blog series, my colleague Pedro Martinez took you through the evolution of digital banking authentication, and the path ahead – consisting of passkeys. Passkeys is a new standardised authentication framework to rid passwords for good – this is great news for all of us, since passwords come with a lot of issues. […]
Posted on 07 April 2020 by
We discuss why businesses must have a strong cybersecurity strategy in place, what the most common fraud practices are and how they can protect themselves.
Posted on 27 November 2018 by
A new report from the Office of the Australian Information Commissioner (OAIC) reveals that phishing was the most criminal attack suffered by Australian organizations in Q3 2018.
Posted on 12 January 2015 by
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posted on 03 October 2014 by
What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?