Security Blog

Feature development & monitoring tips

Category: Social Engineering

September 1, 2020

The Fundamentals of Intrusion

This blog post aims to give a brief insight into some of the various lengths a criminal will go to gain a foothold on your business to enable them to gain entry to your premises. With some remediation steps at the end to demonstrate how even the simplest tactics can dissuade a criminal from getting at your assets and data.

Find Out More
July 24, 2018

Introduction to Spear Phishing

In a previous blog post, we explained the basics of Phishing. This post will go into detail on Spear Phishing. What is Spear Phishing? Phishing involves a scam, transported via electronic communication, that aims to steal sensitive data or lead a user to a bogus site containing malware. Spear Phishing differs from other types of […]

Find Out More
July 4, 2018

What is Phishing?

Phishing is an example of Social Engineering, and is defined as the fraudulent attempt to obtain sensitive information, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. How does Phishing work? Phishing attacks rely on a communication, such as a text message or an e-mail. The attacker may use the […]

Find Out More