Security Blog

Feature development & monitoring tips

Author: CharlieAndrews

August 16, 2018

What is Clone Phishing?

This blog post covers Clone Phishing. What is Clone Phishing? How can you protect yourself from this Social Engineering attack?

Find Out More
August 15, 2018

What is Whaling?

In a previous blog post, we explained the basics of Phishing. This post will go into detail on another type of Social Engineering called Whaling. What is Whaling? Whaling is a type of Phishing attack that is targeted towards high-profile individuals. This may be people such as Corporate Executives, Politicians or Celebrities. In this case, the […]

Find Out More
July 24, 2018

Introduction to Spear Phishing

In a previous blog post, we explained the basics of Phishing. This post will go into detail on Spear Phishing. What is Spear Phishing? Phishing involves a scam, transported via electronic communication, that aims to steal sensitive data or lead a user to a bogus site containing malware. Spear Phishing differs from other types of […]

Find Out More
July 4, 2018

What is Phishing?

Phishing is an example of Social Engineering, and is defined as the fraudulent attempt to obtain sensitive information, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. How does Phishing work? Phishing attacks rely on a communication, such as a text message or an e-mail. The attacker may use the […]

Find Out More
June 29, 2018

The difference between Cyber Essentials and Cyber Essentials Plus

Cyber Essentials is a scheme set up by the UK Government that aids businesses in protecting themselves from common threats to their cyber-security. Certification comes in two forms: Cyber Essentials and Cyber Essentials PLUS. This post will explain the difference between them. Cyber Essentials (Stage 1) This is the initial stage of certification against the […]

Find Out More