<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/author/bill/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog by Bill</title><description>ActiSoft Technology - Blog by Bill</description><link>https://www.actisofttechnology.com/blogs/author/bill</link><lastBuildDate>Wed, 22 Apr 2026 17:12:35 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[7 Reasons Why You Need a Password Manager]]></title><link>https://www.actisofttechnology.com/blogs/post/7-reasons-why-you-need-a-password-manager</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-528286738.jpg"/>Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways f ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__r401yj7QKqEYUGntCz9ww" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm__r401yj7QKqEYUGntCz9ww"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways for cybercriminals. They exploit lists of commonly used passwords and employ simple hacking tools to guess their way into accounts. Imagine someone getting rich by cracking passwords and draining bank accounts.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Monitoring your employees' password habits can be a daunting task without a password management solution in place. A business password manager grants organisations full control and oversight of their employees' password behaviours. The process of onboarding and offboarding employees is also streamlined. Continue reading to discover the functions of a password manager and how it can advantage your organisation.</p></div></div>
</div><div data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:4pt;"><span style="color:inherit;">What Is a Business Password Manager?</span><br></p></div></h2></div>
<div data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>A business <a href="/password-manager" title="password manager" rel="">password manager</a> is a tool that enables you and your employees to track, store, share, protect, and manage all passwords. Passwords are kept in a secure, cloud-based digital vault, accessible only with a master password. This vault can also store more than passwords, including documents, identity cards, and SSH keys, thus streamlining the security of your employees' files and passwords. Additionally, a password manager facilitates the creation of strong, unique passwords for each account, securely storing them.</div></div><br><div>Password managers play a vital role in maintaining the security of your organisation and simplifying the management of your employees' passwords. They also negate the need for employees to submit help desk tickets for password resets.</div></div></div>
</div><div data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width: 1095px ; height: 365.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:723px ; height:241.00px ; } } @media (max-width: 767px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:415px ; height:138.33px ; } } [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/password-manager" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Keeper%20Email%20Banner%201.png" width="415" height="138.33" loading="lazy" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_2pbKfceujRzzEBVqQE6YKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2pbKfceujRzzEBVqQE6YKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Benefits of Having a Password Manager For Your Organisation</span></h2></div>
<div data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Unsure of how a password manager can benefit your organisation? Consider these six advantages of deploying a business password management solution.</span><br></p></div>
</div><div data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">1. Enforce Organisation Password Policies Efficiently</span></blockquote></h2></div>
<div data-element-id="elm_DfFAlHKLU_028c7sd8RgBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DfFAlHKLU_028c7sd8RgBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Centralising password management within a single platform enables organisations to standardise and implement password security policies throughout the organisation. This includes setting a minimum password length and mandating the use of Multi-Factor Authentication (MFA) for every compatible site.</div><br><div>Employing a password manager permits IT administrators to verify compliance with organisational password policies among all employees.</div></div></div>
</div><div data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">2.&nbsp;</span><span style="color:inherit;">Visibility Into Password Practices</span></blockquote></h2></div>
<div data-element-id="elm_8uXirloSpijWoBC0HL6HZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8uXirloSpijWoBC0HL6HZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Without centralised password management, IT administrators lack insight into employees' password habits. This issue of visibility is increasingly critical with the rise of remote work. It will prevent your employees reusing the same password across various sites and applications. Password managers offer a centralised console that grants administrators full visibility into employees' password practices, regardless of whether they are working in the office, remotely, or using a hybrid approach. Don’t worry the IT administrators cannot see the passwords in a user’s vault.</span></p></div>
</div><div data-element-id="elm_EQAi45Nr5HB-alN0WUudaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_EQAi45Nr5HB-alN0WUudaA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_U_uLuctunncA7OsLW5_Hmg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_U_uLuctunncA7OsLW5_Hmg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">3. Securely Share Passwords&nbsp;</span></blockquote></h2></div>
<div data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In businesses, password sharing is essential and crucial for task completion, yet it's imperative that employees have a secure method to share these passwords with their team. A password manager serves this purpose effectively. It enables organisations to establish shared folders for various groups such as individual departments or project teams. Moreover, users can securely share credentials with designated individuals, with the added convenience of automatic credential transfer to the recipient's vault.</div><br><div>Furthermore, our offering of Keeper's password manager provides the option to dictate whether the recipient of shared credentials or folders has the permission to edit or merely view the shared items.</div></div></div>
</div></div><div data-element-id="elm_XPAwacO4FMzxcmRckDloMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XPAwacO4FMzxcmRckDloMA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width: 251px ; height: 324.63px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:723px ; height:935.10px ; } } @media (max-width: 767px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:415px ; height:536.75px ; } } [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/PasswordManagementisCriticaltoYourCybersecurityStr/formperma/awFQlzTQXwg6Q22TZVFF_x9th1kmEpO1iuL5wLvAQzk" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Management%20is%20Critical%20to%20Your%20Cybersecurity%20Strategy.png" width="415" height="536.75" loading="lazy" size="fit"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">4. Implement Role-Based Access Control (RBAC)</span></blockquote></h2></div>
<div data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Employees should be granted only the system access necessary for their job functions, nothing more, this is the Principle of Least Privilege. This not only aids in preventing insider attacks but also reduces organisational risk if an employee's account is compromised. Adopting a standardised password management solution allows organisations to enforce Role-Based Access Control (RBAC) and keep track of account activities for any unusual behaviour that might suggest misuse or a security breach.</span><br></p></div>
</div><div data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">5. Dark Web Monitoring</span></blockquote></h2></div>
<div data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cybercriminals often target Software as a Service (SaaS) developers and other vendors, aiming to steal credentials from their clients' employees. It may take months for an organisation to detect a breach, and usually, the victims of these third-party breaches are the last to realise they've been compromised. Meanwhile, cybercriminals might have already sold the stolen login credentials on the dark web.</div><br><div>BreachWatch, a widely-used extension for Keeper's password manager included in our Enterprise offering, monitors dark web forums and alerts organisations in real-time if any employee passwords or credentials appear online. It integrates smoothly with the Keeper password management platform, allowing IT administrators to promptly enforce password resets.</div></div></div>
</div><div data-element-id="elm_WrMBI_OsWneprZyFTFbpxg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WrMBI_OsWneprZyFTFbpxg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uuGm17GHqiTTsNXtihj0OA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width: 439px ; height: 621.04px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:723px ; height:1022.81px ; } } @media (max-width: 767px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:415px ; height:587.09px ; } } [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/The-Future-of-Defense-infographic-EN.png" width="415" height="587.09" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">6. Simplified employee onboarding and offboarding</span></blockquote></h2></div>
<div data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The use of a uniform password manager streamlines the onboarding process for new hires, facilitating a smooth transition even when the team is partially or fully remote. IT administrators can efficiently prepare new employees for work within minutes by either manually registering each one via the admin console or enrolling multiple users simultaneously using Keeper's supported methods. New employees are welcomed with a personalised email invitation containing a link to set up their Keeper Vault.</div><br><div>Former employees retaining active passwords pose a significant cyber risk, and securing passwords during the offboarding process is vital to an organisation's cybersecurity infrastructure. Upon an employee's departure, their system access must be revoked without delay. Password managers not only enable IT administrators to promptly withdraw access from ex-employees but also offer the option to conceal passwords for current employees within the platform. This measure prevents the copying of passwords through screenshots or written notes and facilitates the secure handover of accounts to successors.</div></div></div>
</div></div></div><div data-element-id="elm_jDrQvhd34KlHdgql0kWmnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jDrQvhd34KlHdgql0kWmnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">7. Helpdesk Tickets</span></blockquote></h2></div>
<div data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is estimated that 40% of help desk calls/tickets pertain to password resets, each costing the business approximately £60. Envision a scenario where a multitude of employees are synchronised on a 90-day password renewal cycle; the impact on productivity could be substantial.</div><br><div><div>IT support teams can be targeted with <a href="/social-engineering" title="social engineering" rel="">social engineering</a> attacks aimed at password resets, they typically rely on static data to confirm an employee's identity, a password manager such as Keeper mitigates that risk.</div></div><br><div>Consider the potential accomplishments of your support team with a decrease in password reset calls/tickets!</div></div></div>
</div><div data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Choosing Keeper as Your Organisation’s Password Manager</span></h2></div>
<div data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Keeper's Enterprise password management solution offers all the essential features required in a password manager, plus many additional benefits. The Keeper password manager operates on a zero trust and zero knowledge basis, ensuring that only the end user can access the plain-text data in their Keeper vault—Keeper's employees included.</div><br><div>With Keeper for Business, every employee receives Keeper across an unlimited number of devices, ensuring comprehensive protection throughout the company. Moreover, it includes a complimentary family plan for every employee.</div></div></div>
</div><div data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Contact our friendly Cyber Security specialists at Actisoft today to find out how Keeper Password Manager can help you improve your security posture and protect your users and organisation.</span><br></p></div>
</div><div data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/KeeperPasswordManager/formperma/905BpiQiQbXnwngYU5Ze23gRzb7UGx4G0hvTnsTcurI"><span class="zpbutton-content">Get Started Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 Jun 2024 12:42:22 +0000</pubDate></item><item><title><![CDATA[UK Cybersecurity Org Offers Advice for Thwarting BEC Attacks]]></title><link>https://www.actisofttechnology.com/blogs/post/uk-cybersecurity-org-offers-advice-for-thwarting-bec-attacks1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-133940537.jpg"/>Written by Stu Sjouwerman The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organisations defend themselves again ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kXPb-INrQjiW74Q9u08oKg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wgsRe_f6SvmeCJ-DdPrNRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_b7Z04h72QieFLn5crFVLmQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_b7Z04h72QieFLn5crFVLmQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kB6yVlmOP6Vj5eKjfr4QbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kB6yVlmOP6Vj5eKjfr4QbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"] .zpimagetext-container figure img { width: 500px ; height: 325.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"] .zpimagetext-container figure img { width:500px ; height:325.00px ; } } @media (max-width: 767px) { [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"] .zpimagetext-container figure img { width:500px ; height:325.00px ; } } [data-element-id="elm_H7FnqAgfLz2t6YDvCVZxbw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/55e3dc434f53a414f6da8c7dda79367f103cd9ed55536c48732f7fd0964dc45db0_1280.jpg" width="500" height="325.00" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="margin-bottom:20px;"><span style="font-size:18px;">The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organisations defend themselves against business email compromise (BEC) attacks, especially those targeting senior staff members.</span></p><p style="margin-bottom:20px;"><span style="font-size:18px;">The NCSC says employees should be cautious about the type of personal information they post on the internet, since criminals can use this knowledge to make their attacks more convincing.</span></p><p style="margin-bottom:20px;"><span style="font-size:18px;">“If there is information about senior staff on work and private websites, including social media accounts and networking sites, criminals can use this to make their&nbsp;<a href="/what-is-phishing" title="phishing" rel="">phishing</a><a href="https://www.knowbe4.com/phishing" rel="noopener" target="_blank">&nbsp;</a>emails appear more convincing,” the advisory says.</span></p></div></div></div>
</div></div><div data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_RQ_v9Ab0wfVoWJJwoxGWgA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">“This information, freely available on the internet, is known as a ‘digital footprint’. Without this information, the phishing emails used to conduct BEC should be easier to spot as fraudulent. All staff, but especially senior executives who have access to valuable assets or information, should review their privacy settings on their social media accounts, and think about what they post in order to reduce their digital footprint.”</span></div><div><br></div><div><span style="font-size:18px;">The NCSC stresses that BEC attacks are more targeted than most phishing emails, and are more likely to bypass technical security measures.</span></div><div><br></div><div><span style="font-size:18px;">“Since BEC emails are normally sent in low volume, standard email filters (designed to identify ‘scam emails’) may struggle to detect them, especially if they come from a legitimate email account that has already been hacked,” the advisory says.</span></div><div><br></div><div><span style="font-size:18px;">“Alternatively, a BEC email may have been sent from a ‘spoofed’ domain, designed to trick users that they are dealing with a legitimate organisation. Some BEC emails may contain viruses disguised as invoices, which are activated when opened.”</span></div></div></div></div></div></div>
</div></div><div data-element-id="elm_2OpsLVgqJJOq6ycE8i5xxA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2OpsLVgqJJOq6ycE8i5xxA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="margin-bottom:20px;"><span style="font-size:18px;">The NCSC says users should be on the lookout for the following red flags associated with BEC attacks:</span></p><ul><ul><li><span style="font-size:18px;">“Think about your usual working practices around financial transactions. If you get an email from an organisation you don't do business with, treat it with suspicion</span></li><li><span style="font-size:18px;">Look out for emails that appear to come from a senior person within your organisation, requesting a payment to a particular account. Look at the sender's name and email address. Does it sound legitimate, or is it trying to mimic someone you know</span></li><li><span style="font-size:18px;">Does the email contain a veiled threat that asks you to act urgently? Be suspicious of phrases like 'send these details within 24 hours' or 'you have been a victim of crime, click here immediately.'&quot;</span></li></ul></ul><p style="margin-bottom:20px;"><span style="font-size:18px;">KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their&nbsp;security culture&nbsp;and reduce human risk.security culture&nbsp;and reduce human risk.</span></p><p style="margin-bottom:20px;"><span>The NCSC has the&nbsp;<a href="https://www.ncsc.gov.uk/guidance/business-email-compromise-defending-your-organisation" target="_blank" rel="noopener">story</a>.</span></p><p style="margin-bottom:20px;"><span>Other NSCS resources on BEC;</span></p><p style="margin-bottom:20px;"><span></span></p><p style="margin-bottom:20px;"><span><span style="color:inherit;"><a href="https://www.ncsc.gov.uk/blog-post/business-email-compromise-guidance-protect-organisation" title="Business email compromise: new guidance to protect your organisation" rel="">Business email compromise: new guidance to protect your organisation</a></span><br></span></p><p style="margin-bottom:20px;"><span></span></p><p style="margin-bottom:20px;"><span></span></p><p style="margin-bottom:20px;"><span><span style="color:inherit;"><a href="https://www.ncsc.gov.uk/files/Business-email-compromise-payment-diversion-fraud.pdf" title="Business email compromise Dealing with targeted phishing emails Graphic" rel="">Business email compromise Dealing with targeted phishing emails Graphic</a></span><br></span></p></div></div></div>
</div><div data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_IkMBfjfkq_toKT5YlIKXYA"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_RxjyZJHuFhLSXSjBuVmbxA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_RxjyZJHuFhLSXSjBuVmbxA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><div style="color:inherit;"><h2>Start Your Free Phishing Security Test</h2></div></h2></div>
<div data-element-id="elm_uhVJ_dRy8ZPVT342pdm83Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uhVJ_dRy8ZPVT342pdm83Q"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><div style="color:inherit;"><h5>Find out what percentage of your employees are Phish-prone</h5></div></h5></div>
<div data-element-id="elm_6bsQ4w6nCowjqYuuWCo0gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6bsQ4w6nCowjqYuuWCo0gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><span style="font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span></div></div></div>
</div><div data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_dy3BvJzjfNr1NdRqp2Me3Q"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-size:24px;"><span style="font-weight:700;">Here's how it works:</span></h3></div></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div>
</div></div></div><div data-element-id="elm_ZijNCVwmjf5erjAJ0TQw8A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZijNCVwmjf5erjAJ0TQw8A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div><span style="font-weight:700;"><br></span></div><div><span style="font-weight:700;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></span></div></div></div>
</div><div data-element-id="elm_AzW8PMl7RyChqHRDuNkjnQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_AzW8PMl7RyChqHRDuNkjnQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" title="Link to a free phishing test for up to 100 users" title="Link to a free phishing test for up to 100 users"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 23 May 2024 16:03:13 +0000</pubDate></item><item><title><![CDATA[The Power of Password Managers: Safeguarding Your Digital World]]></title><link>https://www.actisofttechnology.com/blogs/post/the-power-of-password-managers-safeguarding-your-digital-world</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-840534924.jpg"/>In today's digital age, where our lives are increasingly intertwined with the online world, ensuring the security of our personal information has beco ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EXvjOvRFQK2Qa-o7QCvbfg" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_EXvjOvRFQK2Qa-o7QCvbfg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b6mwa3k0TRKxytMeSsxzNg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IBa9g3NxTrOunKX53tlVRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_IBa9g3NxTrOunKX53tlVRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__fC8aOK-RluvFlFbgY1Rxw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__fC8aOK-RluvFlFbgY1Rxw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;">In today's digital age, where our lives are increasingly intertwined with the online world, ensuring the security of our personal information has become paramount. A crucial aspect of protecting our digital assets is creating and managing strong, unique passwords for every online account. Yet, remembering multiple complex passwords can be a daunting task. This is where password managers come to the rescue, offering convenience, peace of mind, and fortified protection against a range of cyber threats. In this blog, we explore the benefits of using a password manager and the threats they effectively shield us from.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_RFzEKaheaKnKlwXnktoxow" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RFzEKaheaKnKlwXnktoxow"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_usHCiIasw2fC5GeCnpnSZw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_usHCiIasw2fC5GeCnpnSZw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3i3yy9s4FjCITJW87lERMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3i3yy9s4FjCITJW87lERMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aWVEKoePH3OOuEW2-_xDCQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aWVEKoePH3OOuEW2-_xDCQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">What are the Benefits to Using a Password Manager</span></h3></div>
<div data-element-id="elm_jeeasBK5H7-lo9m6TUpNuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jeeasBK5H7-lo9m6TUpNuw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Enhanced Security</span></h4></div>
<div data-element-id="elm_LBH1aSp2QqgWMY3nQjVf6A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LBH1aSp2QqgWMY3nQjVf6A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Password managers generate strong, randomised passwords for each of your online accounts, significantly reducing the risk of unauthorised access. Unlike using predictable passwords or reusing the same one across multiple sites, which can make all your accounts vulnerable if one is breached, a password manager keeps each password unique and encrypted.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_cifmx2x-NWST4R3su0X9-A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_cifmx2x-NWST4R3su0X9-A"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PpIfYxVBjUzMX9HQwBekCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_PpIfYxVBjUzMX9HQwBekCQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FlGzSsUQEcZe_phPpiSRsw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FlGzSsUQEcZe_phPpiSRsw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DLTTu3O3FBH6LxMPOlPoSg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DLTTu3O3FBH6LxMPOlPoSg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Convenience and Time-Saving</span></h4></div>
<div data-element-id="elm_JJmMX5_uoUqvp3NoiT00mA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JJmMX5_uoUqvp3NoiT00mA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">With a password manager, you no longer need to memorise or write down passwords on sticky notes. Instead, you only need to remember one master password to access the password manager itself. This saves valuable time and reduces the frustration of struggling to remember numerous passwords.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_KgoQabR3CQyb2u0GHOG3qA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KgoQabR3CQyb2u0GHOG3qA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pnt1rz8sfFZbLEFu5HgnKg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Pnt1rz8sfFZbLEFu5HgnKg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_J5Momqu9ahZSW8ViKI8yYA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_J5Momqu9ahZSW8ViKI8yYA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_U8zVGWLOXEviRRlOjjfn_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_U8zVGWLOXEviRRlOjjfn_A"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Password Strength Analysis</span></h4></div>
<div data-element-id="elm_oyT6VverRpTbXLtGy0Mzgw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oyT6VverRpTbXLtGy0Mzgw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A password manager often includes features that analyse the strength of your existing passwords and identify any weak or duplicate ones. It helps you rectify these issues and reinforces your overall security posture. Better ones alert you to any passwords that may have been breached.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_vJcyvPExfJ4CQIQmQviZLA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vJcyvPExfJ4CQIQmQviZLA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8YudU30mH19-N18lAKHbuQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_8YudU30mH19-N18lAKHbuQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ISPRg5eigGwf8wrrcn8XIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ISPRg5eigGwf8wrrcn8XIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"] .zpimageheadingtext-container figure img { width: 200px ; height: 200.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"] .zpimageheadingtext-container figure img { width:200px ; height:200.00px ; } } @media (max-width: 767px) { [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"] .zpimageheadingtext-container figure img { width:200px ; height:200.00px ; } } [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1218619602.jpg" data-src="/Images/Small/iStock-1218619602.jpg" width="200" height="200.00" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Cross-Device Synchronisation</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Most password managers offer synchronisation across various devices, ensuring that your passwords are accessible and up-to-date wherever you go. This feature allows for seamless access across smartphones, tablets, and computers.</span><br></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_4NPTtdgM00IVwOq73THJFg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4NPTtdgM00IVwOq73THJFg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_F2Nj-Fwa5AOVRCAG7WBlFg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_F2Nj-Fwa5AOVRCAG7WBlFg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_RjKka4H5TTY5aROVEycCiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RjKka4H5TTY5aROVEycCiA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_LbwU56T1pfy797sKOBVIpA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LbwU56T1pfy797sKOBVIpA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Auto-Fill Functionality</span></h4></div>
<div data-element-id="elm_TuRwHo7c5x7aVmcsfitnSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TuRwHo7c5x7aVmcsfitnSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Password managers can auto-fill login credentials for you, streamlining the login process and reducing the chance of typing errors that might lead to accidental exposure of sensitive information.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_kd2GWyLGDylTC-yjs1jCJg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kd2GWyLGDylTC-yjs1jCJg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wcuD7mOhc4Q6rKHRE-5Y3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wcuD7mOhc4Q6rKHRE-5Y3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VoKnBcI1grAcGDorAfnhcg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_VoKnBcI1grAcGDorAfnhcg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0EYZM7diWChdqgZRiQbY6A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"] .zpimage-container figure img { width: 1095px ; height: 365.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"] .zpimage-container figure img { width:723px ; height:241.00px ; } } @media (max-width: 767px) { [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"] .zpimage-container figure img { width:415px ; height:138.33px ; } } [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/password-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Keeper%20Email%20Banner%201.png" width="415" height="138.33" loading="lazy" size="fit"/></picture></a></figure></div>
</div></div></div></div></div><div data-element-id="elm_WFsCCsQWJUJNJ0J__tN1tA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WFsCCsQWJUJNJ0J__tN1tA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hKO0xzglTnCbdf1KiQVeKA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_hKO0xzglTnCbdf1KiQVeKA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Y1IWkLaO0_AceQCRPDz1bw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Y1IWkLaO0_AceQCRPDz1bw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HHencI79M0c53aOAzJvmeA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HHencI79M0c53aOAzJvmeA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Threats Password Managers Protect Against</span></h3></div>
<div data-element-id="elm_2fLQG8lbLgb80GDa0vBWhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2fLQG8lbLgb80GDa0vBWhQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Phishing Attacks</h4></div>
<div data-element-id="elm_VtdjlUWx4XsaKDe5YEAlig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VtdjlUWx4XsaKDe5YEAlig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><a href="/what-is-phishing" title="Phishing" target="_blank" rel="">Phishing</a> remains one of the most common cyber threats, where attackers use fake websites to steal login information. Password managers help combat this by automatically recognising the correct URLs and refusing to auto-fill credentials on malicious sites.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_EmV5HG-9uPqItcFr1c-V3g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_EmV5HG-9uPqItcFr1c-V3g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9XsHB_kKMwLPYbq3LZcIsg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9XsHB_kKMwLPYbq3LZcIsg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ftTLMZvNnK7M9R9Q3ALBYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ftTLMZvNnK7M9R9Q3ALBYw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_C_6oNNv70SGi3G-Q45B5pw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_C_6oNNv70SGi3G-Q45B5pw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Credential Stuffing</span></h4></div>
<div data-element-id="elm_dM6Kr335drzbIbGnkSIrOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dM6Kr335drzbIbGnkSIrOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In a credential stuffing attack, hackers use combinations of usernames and passwords from previous data breaches to gain unauthorised access to multiple accounts. Password managers thwart this threat by ensuring each account has a unique, strong password.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_r_fuuvnwgcj6KlvsUJPfkg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_r_fuuvnwgcj6KlvsUJPfkg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nN36JEnRmIGnsMCl879Bew" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nN36JEnRmIGnsMCl879Bew"].zprow{ border-radius:1px; } </style><div data-element-id="elm_6tZNxHDHsFJzlh88lnWEIA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_6tZNxHDHsFJzlh88lnWEIA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_tO3LGfe3ZTVx709TUvrYtw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tO3LGfe3ZTVx709TUvrYtw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Keylogging</span><br></h4></div>
<div data-element-id="elm_vRhTJVlOIFN4ZqC_7GLGFA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vRhTJVlOIFN4ZqC_7GLGFA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Keyloggers are malicious software that record keystrokes, allowing hackers to capture sensitive information like passwords. Password managers mitigate this risk by auto-filling passwords, bypassing the need for manual typing.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_Th4AeyvoT61vHlaAf0IMJw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Th4AeyvoT61vHlaAf0IMJw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0l3x6VDn-YKJnl_PaVMAKQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_0l3x6VDn-YKJnl_PaVMAKQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3zIX5P6CqJl7-Lzhmkng5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3zIX5P6CqJl7-Lzhmkng5Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XMFlhKG8qKC8cz6O0DQprw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XMFlhKG8qKC8cz6O0DQprw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Shoulder Surfing</span></h4></div>
<div data-element-id="elm_e8COeaUe5g3MbzHVTmpRrA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e8COeaUe5g3MbzHVTmpRrA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In crowded places, attackers might watch over your shoulder to steal passwords as you type them. Password managers minimise this risk by eliminating the need to manually enter passwords.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_nLMK-tOa7ih4AEW0XnVhaw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nLMK-tOa7ih4AEW0XnVhaw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_4c5WpyqMRqyS3wH1IYRqsA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_4c5WpyqMRqyS3wH1IYRqsA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VmjZIEEpfzAMDvdpid724Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_VmjZIEEpfzAMDvdpid724Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_rZGF5OSbTposSQ8DqmBhsA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rZGF5OSbTposSQ8DqmBhsA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Insider Threats</span></h4></div>
<div data-element-id="elm_VTp1HuEgVgRMV20u_iD6ug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VTp1HuEgVgRMV20u_iD6ug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Password managers protect against internal threats by limiting access to sensitive information. Organisations can restrict access to the password manager's master password, ensuring only authorised personnel can retrieve the stored credentials.</span><br></p></div>
</div><div data-element-id="elm_vLTMXaacGPVzheMZ3A7BEQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vLTMXaacGPVzheMZ3A7BEQ"] div.zpspacer { height:48px; } @media (max-width: 768px) { div[data-element-id="elm_vLTMXaacGPVzheMZ3A7BEQ"] div.zpspacer { height:calc(48px / 3); } } </style><div class="zpspacer " data-height="48"></div>
</div></div></div></div></div><div data-element-id="elm_AcCtm-uGmgO0K3nxoXvRUg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AcCtm-uGmgO0K3nxoXvRUg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QCaKSS-Bvmuc8YdGigngAw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_QCaKSS-Bvmuc8YdGigngAw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_IbZncAWoXYW08s7WDvspNg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IbZncAWoXYW08s7WDvspNg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Bg6HEplmJWq4LJH5Q-V8lA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bg6HEplmJWq4LJH5Q-V8lA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">The adoption of a <a href="/password-manager" title="password manager" target="_blank" rel="">password manager</a> is a critical step towards fortifying your digital security and safeguarding your sensitive information. By generating strong, unique passwords, protecting against various cyber threats, and offering convenient access to your online accounts, password managers prove to be indispensable tools in the fight against cybercrime. Embrace the power of password managers and take control of your digital world with confidence and peace of mind. Remember, your passwords are the gatekeepers to your online world, and with a password manager, you hold the keys to their fortified protection.</span><br></p><p><br></p><p><span style="color:inherit;">81% of breaches are due to a failure to secure passwords, credentials and secrets, you can remove that risk by adding a password manager to your security stack.&nbsp;</span><span style="color:inherit;">It's an excellent addition to your multi-layered security.</span><br></p></div></div>
</div><div data-element-id="elm_YxVPolMOsUEjQDLKBB8Cxw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_YxVPolMOsUEjQDLKBB8Cxw"] div.zpspacer { height:39px; } @media (max-width: 768px) { div[data-element-id="elm_YxVPolMOsUEjQDLKBB8Cxw"] div.zpspacer { height:calc(39px / 3); } } </style><div class="zpspacer " data-height="39"></div>
</div><div data-element-id="elm_7sGx5THkUiSo7sy40nFi_g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7sGx5THkUiSo7sy40nFi_g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>At Actisoft Technology we look to make you secure so that you can Work From Anywhere (WFA) not just in the office or at home, take your protection with you wherever you go.</p><p><br></p><p>Talk with us about how Keeper <a href="/password-manager" title="password manager" target="_blank" rel="">password manager</a> can help you mitigate the risk to your organisation from weak passwords.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Aug 2023 13:47:33 +0000</pubDate></item><item><title><![CDATA[Unraveling the Web of Deception: Exploring the Different Types of Phishing]]></title><link>https://www.actisofttechnology.com/blogs/post/unraveling-the-web-of-deception-exploring-the-different-types-of-phishing</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/g26d70cde2e6d5cd54ef83fd1f167ff4fddbaee87d5845c0c6dac604d2f4d45ded536fe636ec34c724c769af461c629fc3e2e7f7184e9d627a909a6f6919c5db1_1280.jpg"/>In the vast and interconnected world of the internet, phishing has become one of the most prevalent cyber threats. Phishing is a deceptive tactic used ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_6LSCikBBTsye4SNkftaplw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Rm0CVokHR7CwN7M0bXV8Iw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_w9LMH5FeR46UnN0xkjpd_g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_EHfvzVC8SqGXRAhGpJPf5A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EHfvzVC8SqGXRAhGpJPf5A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;">In the vast and interconnected world of the internet, phishing has become one of the most prevalent cyber threats. Phishing is a deceptive tactic used by cybercriminals to trick unsuspecting individuals into divulging sensitive information, such as login credentials, financial data, or personal details. As technology evolves, so does phishing. In this blog, we'll delve into the various types of phishing attacks that have emerged, shedding light on their methods, potential consequences, and ways to stay protected. The below is far from an exhaustive list.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_2COZcMPduLpT8WYT9u9tEw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2COZcMPduLpT8WYT9u9tEw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nkKphswoICDiqUtKIB-Y1g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nkKphswoICDiqUtKIB-Y1g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_MmWqguFxMgJZbhMK5Ybs2Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_MmWqguFxMgJZbhMK5Ybs2Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F3LhZ7WUQjEWN1fVZowNUg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_F3LhZ7WUQjEWN1fVZowNUg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Phishing</span></h4></div>
<div data-element-id="elm_mp9opyQ-x0nioZIoQ6Ok4A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mp9opyQ-x0nioZIoQ6Ok4A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Phishing is one of the most common and traditional forms of phishing attacks. Cybercriminals send fraudulent emails, masquerading as legitimate organisations, such as banks, government agencies, or popular online platforms. These emails typically include enticing subject lines and convincing content, urging recipients to click on malicious links or provide their confidential information. The links lead to fake websites designed to steal user credentials, ultimately compromising their accounts and personal data.</span><br></p></div>
</div><div data-element-id="elm_AhyRY-C2devINZb4_IdKXA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AhyRY-C2devINZb4_IdKXA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Spear Phishing</span></h4></div>
<div data-element-id="elm_9InjjEOD7LPI5C82w3LMyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9InjjEOD7LPI5C82w3LMyQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Spear phishing is a highly targeted and personalised form of phishing. Unlike generic phishing, spear phishing attacks are tailored to specific individuals or organisations. The perpetrators conduct extensive research on their targets, utilising information from social media, public records, or data breaches to craft convincing messages. As a result, the chances of success in tricking the recipients into revealing sensitive information or clicking on malicious links are significantly higher.</span><br></p></div>
</div><div data-element-id="elm_R9NWkGAEkuQVGOOuG5hmOg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_R9NWkGAEkuQVGOOuG5hmOg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Whaling</h4></div>
<div data-element-id="elm_3hWKSc1oapXyVo4jXEUTGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3hWKSc1oapXyVo4jXEUTGw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Whaling is a specialised and sophisticated form of phishing attack that targets high-profile individuals, such as top-level executives, CEOs, company founders, politicians, celebrities, or other individuals with significant authority, influence, or access to valuable information. It is also known as &quot;CEO Fraud&quot; or &quot;BEC&quot; (Business Email Compromise) targeting.</span><br></p></div>
</div></div><div data-element-id="elm_2ZMig7xdvEntSFbfgL8B2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2ZMig7xdvEntSFbfgL8B2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XqM0Zv1wx3GE8xbcflOdNw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_XqM0Zv1wx3GE8xbcflOdNw"] .zpimage-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_XqM0Zv1wx3GE8xbcflOdNw"] .zpimage-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_XqM0Zv1wx3GE8xbcflOdNw"] .zpimage-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_XqM0Zv1wx3GE8xbcflOdNw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-160x600.jpg" width="160" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div></div></div><div data-element-id="elm_cefEPCZUSBroNevQdXQVYw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_cefEPCZUSBroNevQdXQVYw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_E27gBAHedbarzeVH_KzYXw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_E27gBAHedbarzeVH_KzYXw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_CKDP0oE4bqPrtF2GJmxnUQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_CKDP0oE4bqPrtF2GJmxnUQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rqv-N-YZeBlaDp23lZfgcg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Rqv-N-YZeBlaDp23lZfgcg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Smishing (SMS Phishing)</span></h4></div>
<div data-element-id="elm_tnBT_YyBf4prH1jrDadw2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tnBT_YyBf4prH1jrDadw2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">With the increasing use of mobile devices, cybercriminals have shifted their focus to exploit text messages for phishing attacks. Smishing, or SMS phishing, involves sending deceptive text messages containing links to fake websites or asking recipients to reply with personal information. The messages often pose as notifications from trusted sources, making it easy for users to fall victim to this form of phishing</span><br></p></div>
</div><div data-element-id="elm_gUyzuKFcEcV3fCE7BMvucA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gUyzuKFcEcV3fCE7BMvucA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Vishing (Voice Phishing)</span></h4></div>
<div data-element-id="elm_1OtJ3Ij61nMHP0gRR6HDfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1OtJ3Ij61nMHP0gRR6HDfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Vishing, short for voice phishing, relies on social engineering through phone calls to deceive individuals. The attackers pretend to be legitimate entities, such as bank representatives or tech support personnel, to trick victims into revealing sensitive information. Vishing attacks often use tactics like caller ID spoofing to appear more convincing and trustworthy</span><br></p></div>
</div><div data-element-id="elm_6SkE--tm3KOK3QD5sBgjMg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6SkE--tm3KOK3QD5sBgjMg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Pharming</span></h4></div>
<div data-element-id="elm_2T18-Hx1WIy24kLtjJE6qQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2T18-Hx1WIy24kLtjJE6qQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Pharming is a more sophisticated type of phishing that involves compromising the domain name system (DNS) or poisoning the local DNS cache. This manipulation leads users attempting to access a legitimate website to be redirected to a fraudulent one without their knowledge. As a result, victims unknowingly provide their sensitive information to malicious websites, believing they are interacting with genuine platforms.</div></div></div>
</div><div data-element-id="elm_2eBJNF8IprCV3PFHL7aJTA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2eBJNF8IprCV3PFHL7aJTA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Search Engine Phishing</div></div></h4></div>
<div data-element-id="elm_rKL7banPEKV6Y7-G2Fjipw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rKL7banPEKV6Y7-G2Fjipw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Search engine phishing leverages manipulative techniques to place fraudulent websites at the top of search engine results. Unsuspecting users looking for specific information may unknowingly click on these malicious links, leading them to fake websites designed to steal their credentials or infect their systems with malware</span><br></p></div>
</div><div data-element-id="elm_MnILsgi0TYYp4ugcx5Fc9g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MnILsgi0TYYp4ugcx5Fc9g"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Clone Phishing</span></h4></div>
<div data-element-id="elm_U7UymWEm7as5lapTBm9QsQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_U7UymWEm7as5lapTBm9QsQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Clone phishing involves creating replicas or clones of legitimate emails, often targeting users who have already received a genuine email from a trusted source. The attackers modify the content slightly, either by attaching malicious links or using a sense of urgency to prompt the recipient to take immediate action. This form of phishing aims to exploit the recipient's trust in previously received communications, increasing the likelihood of successful deception</span><br></p></div>
</div><div data-element-id="elm_BdvMvqYqqCaMtIpZ9vxwAA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BdvMvqYqqCaMtIpZ9vxwAA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Phishing attacks continue to evolve and adapt to the changing digital landscape. Cybercriminals employ a wide range of tactics to lure unsuspecting victims into their traps, stealing sensitive information and causing substantial harm. Being aware of the various types of phishing attacks is crucial in maintaining online security.</div><div><br></div><div>To protect yourself, always verify the legitimacy of emails, messages, and websites. Use strong, unique passwords for each online account, enable two-factor authentication whenever possible, and keep your devices and software up to date with the latest security patches. Vigilance and cybersecurity awareness are the keys to staying one step ahead of these malicious actors and safeguarding your digital identity and assets</div></div></div>
</div><div data-element-id="elm_F7QIKkun-5Manosd4ddcqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F7QIKkun-5Manosd4ddcqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Want to reduce the risk to your organisation from phishing? We have many options that can be combined to give you <a href="/defence-in-depth" title="Defence-in-Depth" target="_blank" rel="">Defence-in-Depth</a> protection such as our <a href="/managed-services" title="Security Bundles" target="_blank" rel="">Security Bundles</a>, <a href="/security-keys" title="Security Keys" target="_blank" rel="">Security Keys</a> and of course <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 25 Jul 2023 18:49:56 +0000</pubDate></item><item><title><![CDATA[Insider Threat: Is there an Enemy Lurking Within Your Business?]]></title><link>https://www.actisofttechnology.com/blogs/post/insider-threat-is-there-an-enemy-lurking-within-your-business</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-836453798.jpg"/>Insider threats represent a huge security risk to all organisations, and research suggests that the average cost is almost twice that of other types o ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_U4936ylOWD0mh0_dlnVE-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_U4936ylOWD0mh0_dlnVE-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Insider threats represent a huge security risk to all organisations, and research suggests that the average cost is almost twice that of other types of breach.&nbsp; Whether the people behind the threats are acting nefariously or are completely oblivious to what they’ve done, the impact is just as serious. While business leaders are becoming more aware of the risk of insider threats, many organisations still lack the resources and knowledge to protect their data. In this article, we’ll take a look at the different types of insider threat, discuss the associated costs and show you how to mitigate risk.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="color:inherit;font-size:24px;">What is an Insider Threat?</span><span style="font-size:24px;"><br></span></div><div><span style="color:inherit;"><br></span></div><div style="color:inherit;"><div>The term “Insider Threat” is used in the cyber security industry to describe any kind of threat posed by individuals from within an organisation. This can include current employees, stakeholders, contractors, board members, partners and previous employees. Basically, it refers to anyone who has the potential to access networks and put them at risk, whether intentionally or accidentally. The kind of information at risk of being compromised might be financial records, customer and employee data, passwords, business contracts or details of the organisation’s security procedures.</div><br><div>Insider Threats fall into two broad categories:&nbsp;<span style="color:inherit;">intentional and unintentional.&nbsp;</span>.&nbsp;</div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="font-size:18px;"><span style="color:inherit;"><span style="font-weight:700;">Intentional Threats</span> tend to come from disgruntled employees, current staff members or contractors who misuse systems for their own personal gain and/or to cause disruption. People may work alone or in partnership with others, such as hacking organisations or business competitors.</span><br></span></div><div style="color:inherit;"><span style="color:inherit;font-size:18px;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-size:18px;"><span style="font-weight:700;">Unintentional Threats</span> are down to user error and lack of awareness. Those without adequate training and knowledge about cyber security issues can inadvertently put their networks at risk by falling prey to phishing scams, exercising poor password security or sharing data on compromised devices.</span><span style="color:inherit;"><span style="font-size:18px;"><br></span></span></div><div style="color:inherit;"><span style="color:inherit;"><br></span></div><div style="color:inherit;"><div><span style="font-size:24px;">Different Types of Insider Threats</span></div><br><div><div><span style="font-size:18px;">There are several different types of insider threat:</span></div></div><br><div><span style="font-size:24px;">Second Streamers</span></div><br><div><div><span style="font-size:18px;">This refers to current employees who intentionally misuse their organisation’s confidential data, either for financial gain or while working in partnership with others. Second streamers are thought to account for about 62% of all insider threats.</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Angry Ex-Employees</span></div><br><div><span style="font-size:18px;">When people feel wronged, they sometimes want to seek revenge – and compromising valuable data is a great way to do it. About 29% of disgruntled ex-employees committing deliberate sabotage do so for personal financial gain, while others act purely maliciously and want to cause as much damage and disruption as possible.&nbsp;</span></div><br><div><span style="font-size:24px;">Inadvertent Insiders&nbsp;</span></div><br><div><span style="font-size:18px;">This is one of the most common types of insider threat facing organisations today, and it’s all down to user error. People often don’t realise they’ve made a mistake (such as clicking on a dodgy link or sharing financial records with a convincing fraudster) until it’s too late, which is why it’s essential for all employees to have robust, regular cyber security awareness training.&nbsp;</span></div><br><div><span style="font-size:24px;">Persistent Non-Responder</span></div><br><div><span style="font-size:18px;">If you regularly hear someone say something like “all these security measures are just a waste of time, who would want to attack us anyway?” you’re probably dealing with a persistent non responder. Anyone who consistently refuses to adopt appropriate security protocols and continues to share passwords or use insecure devices is a risk – and it’s not always who you might expect. CEOs and board members are often the worst offenders.</span></div><div><span style="font-size:18px;"><br></span></div><div><span style="font-size:18px;"><div style="color:inherit;"><div><div><span style="font-size:24px;">How to Mitigate Risk&nbsp;</span></div></div><br><div>The cyber security landscape is constantly evolving and notoriously complex, so it’s impossible to completely eliminate risk. However, by adopting a multi-layered approach and ensuring you’re completely transparent about what you expect of your employees, it’s entirely possible to significantly reduce the risk of insider threats. Here are just a few measures you can take to protect your organisation:</div><div><ul><ul><li>Undertake regular risk assessments to assess the likelihood of an attack</li><li>Ensure all staff have regular security awareness training</li><li>Maintain close management of all user permissions and ensure that leavers are immediately removed from your systems</li><li>Undertake penetration testing at least once a year</li><li>Implement 24/7 network monitoring&nbsp;</li><li>Organise a cyber security assessment/simulated phishing attack</li><li>Set up a managed detection and response system&nbsp;</li></ul></ul></div></div></span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;">Minimising the risk of insider threats doesn’t have to be hard work when you have the right team on your side. <a href="/contact-us" title="Contact" target="_blank" rel="">Contact</a> our friendly specialists at Actisoft today to find out how we can help.</span><br></div></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Start Your Free Phishing Security Test</span><br></h2></div>
<div data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ"].zpelem-heading { border-radius:1px; margin-block-start:-1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Find out what percentage of your employees are Phish-prone</span></h5></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><div><span style="color:inherit;font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><br></span></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></div></span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Jul 2022 16:39:33 +0000</pubDate></item><item><title><![CDATA[What Are Social Engineering Attacks and How Can You Prevent Them?]]></title><link>https://www.actisofttechnology.com/blogs/post/what-are-social-engineering-attacks-and-how-can-you-prevent-them</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-621493344.jpg"/> is a common tactic used by cyber criminals to manipulate people into sharing confidential information.&nbsp; Hackers exploit people’s trust, knowing ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/security-awareness-training" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1323852923.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><div><span style="font-size:18px;">is a common tactic used by cyber criminals to manipulate people into sharing confidential information.&nbsp; Hackers exploit people’s trust, knowing that when we’re under pressure we may be more likely to make mistakes. The kind of information hackers seek out varies, but commonly includes bank account details, personal information and company files.&nbsp;</span><a href="/social-engineering" title="Social engineering" target="_blank" rel=""><span style="font-size:18px;">Social engineering</span></a><span style="font-size:18px;"> is a common tactic used by cyber criminals to manipulate people into sharing confidential information.&nbsp; Hackers exploit people’s trust, knowing that when we’re under pressure we may be more likely to make mistakes. The kind of information hackers seek out varies, but commonly includes bank account details, personal information and company files.&nbsp; </span></div><span style="font-size:18px;"></span></div><br><div><span style="font-size:18px;">Hackers love to use social engineering because it’s easier to trick someone into sharing their password than to spend time trying to hack into an account. So, they lull victims into a false sense of security by gaining their trust and pretending to be someone else.&nbsp;</span></div><span style="font-size:18px;"><br></span><div><span style="font-size:18px;">Social engineering attacks take many forms, but they commonly look like emails and messages from friends and trusted organisations:</span></div></div></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div></div></div></div></div></div></div></div><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">Emails from Friends</span></div><br><div>Hackers spend a while collecting information about their targets, so if your social media followers and friends list are publicly visible it’s relatively easy for them to create fake email from a friend. These messages contain links, videos or images that include malware, so if you click on them they’ll gain instant access to your device and all your vital information.&nbsp;</div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Emails from Organisations&nbsp;</span></div><br><div><span style="font-size:18px;">These kinds of cyberattack are known as phishing emails. Like fake friend emails, these can be very convincing and are designed to look like they’ve come from trusted sources, such as HMRC or your bank.&nbsp;</span></div><br><div><span style="font-size:18px;">Once hackers have gained a target’s trust, they will create a sense of urgency by asking for help. This might be in the form of a desperate friend being stranded in a foreign country and needing some funds to be wired to them urgently, or a financial institution asking for you to verify personal information.&nbsp; They may also send a message claiming you’re the winner of an online competition, or pretending to be your boss or co-worker asking for client details.&nbsp;</span></div><br><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">The Cost of Social Engineering&nbsp;</span></div><br><div><span style="font-size:18px;">The monetary cost of social engineering attacks on businesses vary according to different sources, from anywhere to £25,000 to upwards of £4 million.&nbsp;</span></div><br><div><span style="font-size:18px;">The biggest social engineering attack recorded to date was led by Evaldas Rimasauskas, who successfully targeted Google and Facebook. He set up a fake company and bank account, posing as a computer manufacturer who worked with the two tech giants. His team of scammers then sent phishing emails to a number of employees within Facebook and Google, attaching invoices for work that had been genuinely undertaken by the real manufacturing company.&nbsp; The money was then deposited into fraudulent accounts, and over the course of two years over $100 million was extorted.&nbsp;</span></div><br><div><span style="font-size:18px;">But perhaps the most important – and most often forgotten – impact of social engineering attacks is the <a href="https://www.actisofttechnology.com/blogs/post/the-hidden-cost-of-cyber-crime-and-how-to-avoid-it" title="human one" target="_blank" rel="">human one</a>. The guilt and shame associated with clicking on an infected email and causing huge organisational damage is too much for some people, with victims becoming depressed or developing severe anxiety. <a href="https://www.reuters.com/article/us-ashleymadison-cybersecurity-idUSKCN0QT1O720150824" title="Two people" target="_blank" rel="">Two people</a> are thought to have committed suicide following the Ashley Madison cyber-attack of 2015, and many others have lost their jobs and livelihoods.</span></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">How to Protect Yourself Against Social Engineering Attacks</span></div><br><div><span style="font-size:18px;">Since social engineers like to act when people are more likely to be under pressure, it’s important to try to stay mindful and vigilant at all times. Here are some ways you can minimise the risk of a successful attack:</span></div><br><div><ul><li><span style="font-size:18px;">Report and delete any messages that ask for financial information or passwords</span></li><li><span style="font-size:18px;">Set your spam filters to “high” and regularly check your folders to ensure no legitimate emails are in there&nbsp;</span></li><li><span style="font-size:18px;">Install robust <a href="/endpoint-protection" title="anti-virus software" target="_blank" rel="">anti-virus software</a>, <a href="/firewall" title="firewalls" target="_blank" rel="">firewalls</a> and <a href="/email-security" title="email filters" target="_blank" rel="">email filters</a> on all devices and user accounts</span><br></li><li><span style="font-size:18px;">Use <a href="/security-keys" title="multi-factor authentication" target="_blank" rel="">multi-factor authentication</a>&nbsp;and <a href="/password-manager" title="strong passwords" target="_blank" rel="">strong passwords</a>, so even if anyone does manage to get hold of your password they’ll still be asked to provide further information if their credentials aren’t familiar</span><br></li><li><span style="font-size:18px;">Double check all email addresses claiming to be from friends or trusted sources before you respond – particularly if they contain links or ask for information</span></li><li><span style="font-size:18px;">Be wary of tempting offers – if it looks too good to be true, it probably is</span></li><li><span style="font-size:18px;">If in doubt, stop. Taking a few minutes to check whether something is legitimate is a lot less time consuming than clicking a link in haste</span></li></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;">To find out more about how to keep your organisation safe, <a href="/contact-us" title="contact" target="_blank" rel="">contact</a> our friendly team of Cyber Security specialists at Actisoft Technology today.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Start Your Free Phishing Security Test</span><br></h2></div>
<div data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ"].zpelem-heading { border-radius:1px; margin-block-start:-1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Find out what percentage of your employees are Phish-prone</span></h5></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><div><span style="color:inherit;font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><br></span></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></div></span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 01 Jul 2022 09:47:38 +0000</pubDate></item><item><title><![CDATA[Your Money or Your Data! A Guide to Ransomware]]></title><link>https://www.actisofttechnology.com/blogs/post/your-money-or-your-data-a-guide-to-ransomware</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1277291171.jpg"/>What is Ransomware?&nbsp; Ransomware is a kind of malicious code that renders a device, server or file unusable until a payment is made to a cybercrimi ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">What is Ransomware?&nbsp;</span></div><br><div>Ransomware is a kind of malicious code that renders a device, server or file unusable until a payment is made to a cybercriminal. Attacks have more than doubled since 2020, and a recent study found that incidents reported to the ICO grew from 326 to 654 between 2020 and 2021. Actual figures will be much higher, as not all incidents are reported (although of course they should be!). The heavily impacted sectors according to the report are finance, education and insurance, but all sorts of businesses have been affected.</div><br><div>Over the years ransomware has evolved and become increasingly sophisticated. While some malicious software of this kind just encrypts certain files, others have the power to completely destroy entire file systems.</div></div></div></div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 334.02px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:334.02px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:334.02px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/security-awareness-training" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-803934282.jpg" width="500" height="334.02" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="color:inherit;font-size:24px;">How it Works</span></div><div><br></div><div><span style="color:inherit;font-size:18px;">As soon as the malware has been installed – usually as the result of a user clicking on a link – the hacker takes control of the system and freezers the user out until they pay up. They often ask for payment in Bitcoin, due to its anonymity, but cyber criminals will sometimes ask for bank details or other types of payment such as Amazon gift vouchers too. Even once the ransom has been paid, there’s no guarantee users will regain full access to their files afterwards. In fact, while over half of victims pay up, but only 8% get all their data back.</span><span style="font-size:18px;"><br></span></div><div><span style="font-size:24px;color:inherit;"><br></span></div><div><span style="font-size:24px;color:inherit;">The Cost of Ransomware Attacks</span><br></div><div style="color:inherit;"><br><div><div><span style="font-size:18px;">According to Yubico, the average cost of a ransomware attack was $1.85 million (£1.4m) in 2021. Along with the initial monetary demands, other costs include business downtime, lost sales, operating costs and legal fees. In the case of attacks where more sensitive information is compromised, costs can be as much as $4.44 million (£3.5m).</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">There are severe reputational costs to consider too. New strains of ransomware can affect entire supply chains, which puts partner organisations and their customers at risk. Under GDPR regulations all breaches must be reported to the ICO, which means they are also made public. Insurance companies are less likely to touch organisations that have been hit hard by ransomware attacks, and if they do, you can expect your premiums to rocket.</span></div><br><div><span style="font-size:18px;">Once an organisation has been targeted – and agreed to pay the ransom – they then become an easy target for future ransomware attacks.</span></div><br><div><span style="font-size:18px;">Although most cybercriminals are motivated by money and other financial rewards, others act out of spite or for political reasons. They often use a range of different methods to extort money or information, and in some cases if ransoms aren’t paid they’ll even go as far as contacting customers direct and demanding money from them.&nbsp;</span></div><br><div style="color:inherit;"><div><span style="font-size:24px;">How to Prevent a Ransomware Attack&nbsp;</span></div><br><div><div><span style="font-size:18px;">A while ago, all you needed to protect against a ransomware attack was a secure backup system and fast data restore process. Things have changed in recent years. At their worst, modern attacks can bring entire organisations to their knees, so traditional methods are no longer enough, so you need a more comprehensive, multi layered line of defence in place.&nbsp;</span></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">But as with most other cyber-attacks, the best way to avoid a costly ransomware attack is by creating a culture of awareness and making sure your staff have the right training. Malicious software can only be installed if a human allows it, so it’s essential that everyone knows what to look out for.&nbsp;</span></div><br><div><span style="font-size:18px;"><span style="color:inherit;">Here are some steps you can take to minimise the risks:</span><br></span></div><div><ul><ul><li><span style="color:inherit;font-size:18px;">Make sure everyone in your organisation is trained and knows to never click on unverified links</span></li><li><span style="font-size:18px;">Have all your emails scanned for malware</span></li><li><span style="font-size:18px;">Install firewalls and Endpoint Protection&nbsp;</span></li><li><span style="font-size:18px;">Only ever download from trusted sites that your IT team have approved</span></li><li><span style="font-size:18px;">Keep regular backups of all your files</span></li><li><span style="font-size:18px;">Avoid using public Wi-Fi&nbsp;</span></li><li><span style="font-size:18px;">Never allow unverified, unfamiliar USBs in any of your devices</span></li><li><span style="font-size:18px;">Install robust security software&nbsp;</span></li><li><span style="font-size:18px;">Never share sensitive data with anyone you’re not 100% certain of&nbsp;</span></li></ul></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;">As specialists in cyber security, our team at Actisoft can talk you through all the risks and provide you with all the tools you need to avoid a ransomware attack. From <a href="/firewall" title="firewalls" target="_blank" rel="">firewalls</a> and <a href="/endpoint-protection" title="Endpoint Protection" target="_blank" rel="">Endpoint Protection</a> to <a href="/cybersmart" title="Cyber Essentials" target="_blank" rel="">Cyber Essentials</a> accreditation and much more, we’re here to help.&nbsp;</span><br></div></div></div></div></div>
</div><div data-element-id="elm_jjS7Nt0qWE1PaMe19EVS9Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_jjS7Nt0qWE1PaMe19EVS9Q"] .zpimage-container figure img { width: 500px ; height: 644.35px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jjS7Nt0qWE1PaMe19EVS9Q"] .zpimage-container figure img { width:500px ; height:644.35px ; } } @media (max-width: 767px) { [data-element-id="elm_jjS7Nt0qWE1PaMe19EVS9Q"] .zpimage-container figure img { width:500px ; height:644.35px ; } } [data-element-id="elm_jjS7Nt0qWE1PaMe19EVS9Q"].zpelem-image { border-radius:1px; margin-block-start:38px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/RansomwareHostageRescueManual/formperma/ExFgdkf-qEuo0YuygKbyjaALHXy3Cz2XnvBwpFhxDiw" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Ransomware%20Hostage%20Rescue%20Manual.png" width="500" height="644.35" loading="lazy" size="medium"/></picture></a></figure></div>
</div><div data-element-id="elm_CNIUcAeX7iaMEqD7sOzU-g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CNIUcAeX7iaMEqD7sOzU-g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/RansomwareHostageRescueManual/formperma/ExFgdkf-qEuo0YuygKbyjaALHXy3Cz2XnvBwpFhxDiw" target="_blank"><span class="zpbutton-content">Get the Manual</span></a></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Start Your Free Phishing Security Test</span><br></h2></div>
<div data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ"].zpelem-heading { border-radius:1px; margin-block-start:-1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Find out what percentage of your employees are Phish-prone</span></h5></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><div><span style="color:inherit;font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><br></span></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></div></span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Jun 2022 10:50:48 +0000</pubDate></item><item><title><![CDATA[National Health Service Becomes the Latest Victim of a Credential Harvesting Phishing Operation]]></title><link>https://www.actisofttechnology.com/blogs/post/national-health-service-becomes-the-latest-victim-of-a-credential-harvesting-phishing-operation</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-133940537.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Part of a six-month attack, email accounts on the NHS’ Microsoft 365 instance were compromised, resul ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_EHQ823Rwygf6lLmxLBfRrA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EHQ823Rwygf6lLmxLBfRrA"].zpelem-text { border-radius:1px; margin-block-start:4px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 403.50px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:403.50px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:403.50px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-627319476.jpg" width="500" height="403.50" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">Part of a six-month attack, email accounts on the NHS’ Microsoft 365 instance were compromised, resulting in over 1,100 targeted email attacks used to obtain more credentials.</span></div><div><br></div><div><a href="https://www.inky.com/en/blog/fresh-phish-britains-national-health-service-infected-by-massive-phishing-campaign" title="According to security researchers at email protection vendor Inky" target="_blank" rel=""><span style="font-size:18px;">According to security researchers at email protection vendor Inky</span></a><span style="font-size:18px;">, the 139 compromised NHS accounts were being misused from October 2021 until March of 2022 as the cornerstone of further <a href="/what-is-phishing" title="phishing" target="_blank" rel="">phishing</a> attacks attempted to either harvest credentials to major online platforms, or to trick victims into providing banking details.</span></div><div><br></div><div><span style="font-size:18px;">Emails were likely sent using two IP addresses serving as SMTP relays for the NHS’ 27,000+ users, allowing attackers to work remotely. What may have allowed this attack to remain undetected for 6 months was the number of emails being sent:</span></div></div></div></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
<div data-element-id="elm_eu3MIDHjwMRWhrTCWe25Fw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eu3MIDHjwMRWhrTCWe25Fw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VGVIOy5o9lPHEX0Wb_GfYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_VGVIOy5o9lPHEX0Wb_GfYw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_dCWc0QdV68asiqiV3b5KvA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"] .zpimage-container figure img { width: 539px !important ; height: 300px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"] .zpimage-container figure img { width:539px ; height:300px ; } } @media (max-width: 767px) { [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"] .zpimage-container figure img { width:539px ; height:300px ; } } [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Graph.png" width="539" height="300" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_RoWw9J3Fe4AiolJ-MLRB_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RoWw9J3Fe4AiolJ-MLRB_Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>You’ll note the dramatic spike in the number of emails sent in March of this year, likely drawing attention to the attack.</div><div><br></div><div>Emails impersonated both the NHS and individuals within, using NHS email footers, and names of compromised individuals to add credibility to the scams.</div></div></div>
</div><div data-element-id="elm_wkfgogqnTa5_50I8NC6gxg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"] .zpimage-container figure img { width: 521px !important ; height: 300px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"] .zpimage-container figure img { width:521px ; height:300px ; } } @media (max-width: 767px) { [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"] .zpimage-container figure img { width:521px ; height:300px ; } } [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Email-1.png" width="521" height="300" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_FoHXYUHymQig9-_efNgt2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FoHXYUHymQig9-_efNgt2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"] .zpimage-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"] .zpimage-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"] .zpimage-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_4_NtXtcU7srGA2bbxlSHRA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4_NtXtcU7srGA2bbxlSHRA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>While there were only 139 compromised email accounts (out of over 27,000, according to the NHS), it literally only takes a single phishing email to alter the course of an individual or an organisation. Because most phishing scams need to get the victim to focus on one response action (e.g., clicking a link or opening an attachment), the scams can generally be identified pretty easily, if the user is vigilant.</div><br><div><div>And this vigilance comes with education through <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> designed to help users understand the nature of phishing attacks, social engineering techniques, and the role they play in corporate cybersecurity.</div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Free <span style="font-weight:700;">Phishing Security Test</span></span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div></div></div>
</div><div data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:24px;font-weight:700;">Here's how it works:</span></p><div style="color:inherit;"><div><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></div></div></div>
</div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 16 Jun 2022 15:30:26 +0000</pubDate></item><item><title><![CDATA[What You Need to Know About Phishing: The Biggest Threat to UK Organisations]]></title><link>https://www.actisofttechnology.com/blogs/post/what-you-need-to-know-about-phishing-the-biggest-threat-to-uk-businesses-in-2022</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-502758397.jpg"/>Phishing is an attempt by cybercriminals posing as legitimate institutions, usually (but not always!) via email, to obtain sensitive information from ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div><span style="font-weight:700;">Phishing</span> is an attempt by cybercriminals posing as legitimate institutions, usually (but not always!) via email, to obtain sensitive information from targeted individuals.&nbsp;</div></div><br><div>These attacks are on the rise, with more than 80% of organisations being targeted in 2021 alone. One of the most frustrating things about phishing is that these attacks are becoming so realistic and sophisticated that it’s becoming increasingly hard to spot them. So, even if you think you know everything there is to know about online scams, it’s still surprisingly easy to get caught out.</div><br><div>There are many different types of phishing, but in this post we’ll concentrate on the most common types affecting UK businesses right now.&nbsp;</div></div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 500.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:500.00px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:500.00px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-954712690.jpg" width="500" height="500.00" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Email Phishing&nbsp;</span></div><br><div><span style="font-size:18px;">Most phishing attacks are deployed via email, and hackers are getting really good at creating fake accounts that look just like the real thing. They register fake domains that mimic well known organisations (such as Amazon, the NHS or Google) and send thousands of generic emails in what’s known as a “spray and pray” approach. The idea is that if they send a massive amount of emails, at least a few people will respond.&nbsp;</span></div><br><div><span style="font-size:18px;">These attacks are on the rise because they work. The fake domains they create are so realistic that targets have to look really closely – they copy the logos and font type exactly, and often just one character is out of place in the email address. Many recipients see something that looks very familiar and assume it’s safe. As soon as they click on the link or download the attachment, it’s too late.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Spear Phishing</span></div><br><div><span style="font-size:18px;">This is a more sophisticated type of email phishing attack. Instead of using a “spray and pray” approach cyber criminals will target particular people within an organisation, which involves more time and effort.&nbsp;</span></div><br><div><span style="font-size:18px;">Before they send their malicious emails, hackers will have gathered important information about their targets including things like their name, job title, work location, email address and other specific information about their role. These attacks are particularly hard to identify because they address the user by name and often refer to other members of staff, meetings or work activities that are familiar to the target. Unlike the email scams of old, they’re often written in perfect English and seem totally legitimate – so it’s often only a matter of time before the hacker has access to the user’s data.</span></div><br><div style="color:inherit;"><div><span style="font-size:24px;">Whaling&nbsp;</span></div><br><div><div><span style="font-size:18px;">Whaling attacks go a step further, and are usually aimed at senior staff members within an organisation. Whaling emails tend to be more subtle, and they’re less likely to use tricks like fake links. Instead, they’re likely to pose as a CEO or board member requesting vital information or the transfer of funds. The hackers create a sense of urgency, saying things like “I know you might be busy but really need you to get this done now” and they rely on employees being keen to keep their bosses happy.</span></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Angler Phishing</span></div><br><div><span style="font-size:18px;">This is a relatively new form of attack, which is deployed via social media. Hackers share posts including fake URLs, cloned websites and infected links and use instant messages to encourage victims to download malware. Cyber criminals keep an eye out for customers contacting organisations with complaints, then hijack the organisations’ social media accounts and ask for the customers to provide their bank account details in order to receive a refund. Of course, that refund never happens, and scammers walk away with valuable data and banking information.&nbsp;</span></div><br><div><span style="font-size:24px;color:inherit;">Smishing and Vishing&nbsp;</span><br></div><br><div><span style="font-size:18px;">These are more like old school hacks because they take place over the phone rather than via email, but they’re no less damaging. In a smishing attack, the victim will receive a text message asking them to follow a link or download a piece of software to their phones, while a vishing attack involves a telephone conversation. A common tactic is for criminals to pretend to be calling from a bank, alerting victims to suspicious activities on their accounts. Attacks of this kind can look incredibly realistic these days, and hackers rely on the fact that when people are stressed and under pressure they’re more likely to make silly mistakes.&nbsp;</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Phishing attacks are estimated to cost the UK economy over £5 billion a year. The best way to prevent these attacks is with anti-phishing and anti-spam software, but it’s also essential to stay aware and on guard – which goes for smishing and vishing too. This means ensuring all staff are regularly trained and understand how to spot a potential threat.</div><br><div><div>For more detail about different types of phishing, our partner <a href="https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks" title="Fortinet" target="_blank" rel="">Fortinet</a> has put together a comprehensive list you can also visit our <a href="/what-is-phishing" title="Phishing page" target="_blank" rel="">Phishing page</a>. We are also happy to talk to you about the most common threats to your organisation and deliver cyber security training. Contact us today for a no obligation quote!</div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Start Your Free Phishing Security Test</span><br></h2></div>
<div data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ"].zpelem-heading { border-radius:1px; margin-block-start:-1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Find out what percentage of your employees are Phish-prone</span></h5></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><div><span style="color:inherit;font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><br></span></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></div></span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 15 Jun 2022 12:28:33 +0000</pubDate></item><item><title><![CDATA[Top Cyber Threats to SMEs]]></title><link>https://www.actisofttechnology.com/blogs/post/top-cyber-threats-to-smes-in-2022....and-more-than-likely-beyond</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-479801072 -1-.jpg"/>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber crimin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber criminals. But the truth is, small organisations are just as much at risk of hacks and other security threats as huge corporations – in fact, being smaller may make you more of a target.&nbsp;</div><br><div>Attackers are targeting thousands of businesses every day, and those with less robust defences in place make much easier prey than bigger organisations who can invest more time and money into cyber security.&nbsp;</div><br><div><div>Hackers also love <a href="https://www.webroot.com/blog/2022/02/10/3-reasons-we-forget-small-midsized-businesses-are-major-targets-for-ransomware/" title="targeting small businesses" target="_blank" rel="">targeting small businesses</a> because they often deal with large sums of money and have great contacts – which means there’s lots of lovely data to steal.</div></div><br><div>It's often said that knowledge is power, and that’s certainly true when it comes to cyber-crime. The owners and managers of SMEs need to be aware of the risks, which is why we’ve put together this short article outlining the most common cyber-attacks right now and what we have seen.</div></div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 531.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-679718274.jpg" width="500" height="531.41" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;font-weight:400;">1) Phishing&nbsp;</span></div><br><div><span style="font-size:18px;">By far the most prevalent – and damaging – threat facing small and medium sized businesses in 2022 is phishing. These attacks account for 90% of all breaches; a figure that’s grown by 65% since 2021. Phishing attacks are when a hacker sends an email pretending to be from trusted contact, tricking the recipient to click on a malicious link, download a code or share sensitive information. There are several types of phishing attacks you need to know about:</span></div><br><div><ul><li><span style="font-size:18px;">The spray and pray approach, which is where hackers send out thousands of emails all at once, in the hope that one or two will bite</span></li><li><span style="font-size:18px;">Spear phishing: a campaign that targets a particular person or organisation and includes information which is known to be of interest to the specific target</span></li><li><span style="font-size:18px;">Whaling: an even more targeted and carefully executed attack, where the hacker goes after a specific C level executive in the organisation&nbsp;</span></li></ul></div><br><div><span style="font-size:18px;">Phishing attacks are becoming increasingly sophisticated, which means that even if you think you’ve seen it all before, you could still be caught out.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-693352614.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">2) Ransomware&nbsp;</span></div><br><div><span style="font-size:18px;">Ransomware is a type of malicious software which prevents or restricts users from accessing their computer systems and data, commonly by locking their screens and/or files until they pay a ransom. Like other cyber-attacks, ransomware technology has become more sophisticated over recent years. A popular attack at the moment is a breed of ransomware known as “cryptoransomware” where files are encrypted and users are forced to send an online payment in return for a decryption code.</span></div><br><div><span style="font-size:18px;">Hackers will push for payments in all sorts of ways, though. The costs vary according to the type of ransomware being used and different exchange rates. Users are often asked to pay their ransoms in bitcoin, because it offers a greater level of anonymity, but hackers also list alternative options such as Amazon gift cards or iTunes vouchers. Sometimes it seems like an easy option to just pay up, but it should be noted that paying the ransom is no guarantee your files will be returned.</span></div></div></div></div>
</div></div><div data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-621493344.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">3) Social Engineering&nbsp;</span></div><br><div><div><span style="font-size:18px;">Social engineering <a href="https://blog.knowbe4.com/we-do-not-talk-enough-about-social-engineering-and-its-hurting-us" title="plays a huge role" target="_blank" rel="">plays a huge role</a> in cyber-crime. Even though advances in technology have been behind more sophisticated attacks, those attacks can only be properly deployed by a human. So, hackers work hard to understand how people think and manipulate them into making security mistakes or sharing valuable data. Social engineering happens in several phases. First, the hacker investigates their victim and identifies any weaknesses in their security systems. Next they start to gain their trust, either by sharing information the victim might be interested in or by pretending to be a trusted contact. Then, when the target lets their guard down and begins to trust the hacker, they’ll go in for the kill.&nbsp;</span></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1323852923.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">4) Insider Threat&nbsp;</span></div><br><div><div><span style="font-size:18px;">Insider threats are posed by individuals from inside an organisation. This can include current or previous staff members, partners and contractors with access to passwords and company data. These individuals may act maliciously, intentionally stealing data or infiltrating systems for personal gain, but often they’re completely unwitting. Lack of awareness about cyber security issues can turn the most diligent worker into an insider threat, so it’s important to have robust policies and training measures in place.&nbsp;</span></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width: 300px !important ; height: 250px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } @media (max-width: 767px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-300x250.jpg" width="300" height="250" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">5) Shadow IT</span></div>
<br><div><span style="font-size:18px;">Shadow IT is a term covering the use of different IT systems, apps, services and devices that haven’t been approved by an IT department. Since Cloud services have become more popular, and also since the first lockdown, the use of Shadow IT has grown exponentially. New technology drives innovation and can deliver huge cost and time savings, but without the right security measures in place it also poses a huge risk. </span></div>
<br><div><br></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div>
</div></div></div></div></div><div data-element-id="elm_YMPka8PIM1yThWWIy9D0NA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-864427926.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">6) Software Exploits</span></div><br><div><div><span style="font-size:18px;">A software exploit is a code that’s been written to take advantage of a particular vulnerability or flaw in a piece of software. Although security professionals sometimes develop these exploits as evidence of vulnerabilities, they’re also widely used by hackers with malicious intent.&nbsp;</span></div></div><br><div><br></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">The purpose of this article is to provide you with an overview of the most common threats to your organisation. We’ll go into more detail about each type (and a few others!) in our next articles. In the meantime, if you want to know more about how to protect your SME from cyber threats, get in touch!</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 10 Jun 2022 11:13:34 +0000</pubDate></item></channel></rss>