<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/social-engineering/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #Social Engineering</title><description>ActiSoft Technology - Blog #Social Engineering</description><link>https://www.actisofttechnology.com/blogs/tag/social-engineering</link><lastBuildDate>Wed, 22 Apr 2026 03:47:11 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[7 Reasons Why You Need a Password Manager]]></title><link>https://www.actisofttechnology.com/blogs/post/7-reasons-why-you-need-a-password-manager</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-528286738.jpg"/>Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways f ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__r401yj7QKqEYUGntCz9ww" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm__r401yj7QKqEYUGntCz9ww"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways for cybercriminals. They exploit lists of commonly used passwords and employ simple hacking tools to guess their way into accounts. Imagine someone getting rich by cracking passwords and draining bank accounts.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Monitoring your employees' password habits can be a daunting task without a password management solution in place. A business password manager grants organisations full control and oversight of their employees' password behaviours. The process of onboarding and offboarding employees is also streamlined. Continue reading to discover the functions of a password manager and how it can advantage your organisation.</p></div></div>
</div><div data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:4pt;"><span style="color:inherit;">What Is a Business Password Manager?</span><br></p></div></h2></div>
<div data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>A business <a href="/password-manager" title="password manager" rel="">password manager</a> is a tool that enables you and your employees to track, store, share, protect, and manage all passwords. Passwords are kept in a secure, cloud-based digital vault, accessible only with a master password. This vault can also store more than passwords, including documents, identity cards, and SSH keys, thus streamlining the security of your employees' files and passwords. Additionally, a password manager facilitates the creation of strong, unique passwords for each account, securely storing them.</div></div><br><div>Password managers play a vital role in maintaining the security of your organisation and simplifying the management of your employees' passwords. They also negate the need for employees to submit help desk tickets for password resets.</div></div></div>
</div><div data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width: 1095px ; height: 365.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:723px ; height:241.00px ; } } @media (max-width: 767px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:415px ; height:138.33px ; } } [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/password-manager" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Keeper%20Email%20Banner%201.png" width="415" height="138.33" loading="lazy" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_2pbKfceujRzzEBVqQE6YKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2pbKfceujRzzEBVqQE6YKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Benefits of Having a Password Manager For Your Organisation</span></h2></div>
<div data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Unsure of how a password manager can benefit your organisation? Consider these six advantages of deploying a business password management solution.</span><br></p></div>
</div><div data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">1. Enforce Organisation Password Policies Efficiently</span></blockquote></h2></div>
<div data-element-id="elm_DfFAlHKLU_028c7sd8RgBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DfFAlHKLU_028c7sd8RgBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Centralising password management within a single platform enables organisations to standardise and implement password security policies throughout the organisation. This includes setting a minimum password length and mandating the use of Multi-Factor Authentication (MFA) for every compatible site.</div><br><div>Employing a password manager permits IT administrators to verify compliance with organisational password policies among all employees.</div></div></div>
</div><div data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">2.&nbsp;</span><span style="color:inherit;">Visibility Into Password Practices</span></blockquote></h2></div>
<div data-element-id="elm_8uXirloSpijWoBC0HL6HZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8uXirloSpijWoBC0HL6HZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Without centralised password management, IT administrators lack insight into employees' password habits. This issue of visibility is increasingly critical with the rise of remote work. It will prevent your employees reusing the same password across various sites and applications. Password managers offer a centralised console that grants administrators full visibility into employees' password practices, regardless of whether they are working in the office, remotely, or using a hybrid approach. Don’t worry the IT administrators cannot see the passwords in a user’s vault.</span></p></div>
</div><div data-element-id="elm_EQAi45Nr5HB-alN0WUudaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_EQAi45Nr5HB-alN0WUudaA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_U_uLuctunncA7OsLW5_Hmg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_U_uLuctunncA7OsLW5_Hmg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">3. Securely Share Passwords&nbsp;</span></blockquote></h2></div>
<div data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In businesses, password sharing is essential and crucial for task completion, yet it's imperative that employees have a secure method to share these passwords with their team. A password manager serves this purpose effectively. It enables organisations to establish shared folders for various groups such as individual departments or project teams. Moreover, users can securely share credentials with designated individuals, with the added convenience of automatic credential transfer to the recipient's vault.</div><br><div>Furthermore, our offering of Keeper's password manager provides the option to dictate whether the recipient of shared credentials or folders has the permission to edit or merely view the shared items.</div></div></div>
</div></div><div data-element-id="elm_XPAwacO4FMzxcmRckDloMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XPAwacO4FMzxcmRckDloMA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width: 251px ; height: 324.63px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:723px ; height:935.10px ; } } @media (max-width: 767px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:415px ; height:536.75px ; } } [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/PasswordManagementisCriticaltoYourCybersecurityStr/formperma/awFQlzTQXwg6Q22TZVFF_x9th1kmEpO1iuL5wLvAQzk" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Management%20is%20Critical%20to%20Your%20Cybersecurity%20Strategy.png" width="415" height="536.75" loading="lazy" size="fit"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">4. Implement Role-Based Access Control (RBAC)</span></blockquote></h2></div>
<div data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Employees should be granted only the system access necessary for their job functions, nothing more, this is the Principle of Least Privilege. This not only aids in preventing insider attacks but also reduces organisational risk if an employee's account is compromised. Adopting a standardised password management solution allows organisations to enforce Role-Based Access Control (RBAC) and keep track of account activities for any unusual behaviour that might suggest misuse or a security breach.</span><br></p></div>
</div><div data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">5. Dark Web Monitoring</span></blockquote></h2></div>
<div data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cybercriminals often target Software as a Service (SaaS) developers and other vendors, aiming to steal credentials from their clients' employees. It may take months for an organisation to detect a breach, and usually, the victims of these third-party breaches are the last to realise they've been compromised. Meanwhile, cybercriminals might have already sold the stolen login credentials on the dark web.</div><br><div>BreachWatch, a widely-used extension for Keeper's password manager included in our Enterprise offering, monitors dark web forums and alerts organisations in real-time if any employee passwords or credentials appear online. It integrates smoothly with the Keeper password management platform, allowing IT administrators to promptly enforce password resets.</div></div></div>
</div><div data-element-id="elm_WrMBI_OsWneprZyFTFbpxg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WrMBI_OsWneprZyFTFbpxg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uuGm17GHqiTTsNXtihj0OA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width: 439px ; height: 621.04px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:723px ; height:1022.81px ; } } @media (max-width: 767px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:415px ; height:587.09px ; } } [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/The-Future-of-Defense-infographic-EN.png" width="415" height="587.09" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">6. Simplified employee onboarding and offboarding</span></blockquote></h2></div>
<div data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The use of a uniform password manager streamlines the onboarding process for new hires, facilitating a smooth transition even when the team is partially or fully remote. IT administrators can efficiently prepare new employees for work within minutes by either manually registering each one via the admin console or enrolling multiple users simultaneously using Keeper's supported methods. New employees are welcomed with a personalised email invitation containing a link to set up their Keeper Vault.</div><br><div>Former employees retaining active passwords pose a significant cyber risk, and securing passwords during the offboarding process is vital to an organisation's cybersecurity infrastructure. Upon an employee's departure, their system access must be revoked without delay. Password managers not only enable IT administrators to promptly withdraw access from ex-employees but also offer the option to conceal passwords for current employees within the platform. This measure prevents the copying of passwords through screenshots or written notes and facilitates the secure handover of accounts to successors.</div></div></div>
</div></div></div><div data-element-id="elm_jDrQvhd34KlHdgql0kWmnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jDrQvhd34KlHdgql0kWmnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">7. Helpdesk Tickets</span></blockquote></h2></div>
<div data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is estimated that 40% of help desk calls/tickets pertain to password resets, each costing the business approximately £60. Envision a scenario where a multitude of employees are synchronised on a 90-day password renewal cycle; the impact on productivity could be substantial.</div><br><div><div>IT support teams can be targeted with <a href="/social-engineering" title="social engineering" rel="">social engineering</a> attacks aimed at password resets, they typically rely on static data to confirm an employee's identity, a password manager such as Keeper mitigates that risk.</div></div><br><div>Consider the potential accomplishments of your support team with a decrease in password reset calls/tickets!</div></div></div>
</div><div data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Choosing Keeper as Your Organisation’s Password Manager</span></h2></div>
<div data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Keeper's Enterprise password management solution offers all the essential features required in a password manager, plus many additional benefits. The Keeper password manager operates on a zero trust and zero knowledge basis, ensuring that only the end user can access the plain-text data in their Keeper vault—Keeper's employees included.</div><br><div>With Keeper for Business, every employee receives Keeper across an unlimited number of devices, ensuring comprehensive protection throughout the company. Moreover, it includes a complimentary family plan for every employee.</div></div></div>
</div><div data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Contact our friendly Cyber Security specialists at Actisoft today to find out how Keeper Password Manager can help you improve your security posture and protect your users and organisation.</span><br></p></div>
</div><div data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/KeeperPasswordManager/formperma/905BpiQiQbXnwngYU5Ze23gRzb7UGx4G0hvTnsTcurI"><span class="zpbutton-content">Get Started Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 Jun 2024 12:42:22 +0000</pubDate></item><item><title><![CDATA[Insider Threat: Is there an Enemy Lurking Within Your Business?]]></title><link>https://www.actisofttechnology.com/blogs/post/insider-threat-is-there-an-enemy-lurking-within-your-business</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-836453798.jpg"/>Insider threats represent a huge security risk to all organisations, and research suggests that the average cost is almost twice that of other types o ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_U4936ylOWD0mh0_dlnVE-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_U4936ylOWD0mh0_dlnVE-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Insider threats represent a huge security risk to all organisations, and research suggests that the average cost is almost twice that of other types of breach.&nbsp; Whether the people behind the threats are acting nefariously or are completely oblivious to what they’ve done, the impact is just as serious. While business leaders are becoming more aware of the risk of insider threats, many organisations still lack the resources and knowledge to protect their data. In this article, we’ll take a look at the different types of insider threat, discuss the associated costs and show you how to mitigate risk.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="color:inherit;font-size:24px;">What is an Insider Threat?</span><span style="font-size:24px;"><br></span></div><div><span style="color:inherit;"><br></span></div><div style="color:inherit;"><div>The term “Insider Threat” is used in the cyber security industry to describe any kind of threat posed by individuals from within an organisation. This can include current employees, stakeholders, contractors, board members, partners and previous employees. Basically, it refers to anyone who has the potential to access networks and put them at risk, whether intentionally or accidentally. The kind of information at risk of being compromised might be financial records, customer and employee data, passwords, business contracts or details of the organisation’s security procedures.</div><br><div>Insider Threats fall into two broad categories:&nbsp;<span style="color:inherit;">intentional and unintentional.&nbsp;</span>.&nbsp;</div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="font-size:18px;"><span style="color:inherit;"><span style="font-weight:700;">Intentional Threats</span> tend to come from disgruntled employees, current staff members or contractors who misuse systems for their own personal gain and/or to cause disruption. People may work alone or in partnership with others, such as hacking organisations or business competitors.</span><br></span></div><div style="color:inherit;"><span style="color:inherit;font-size:18px;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-size:18px;"><span style="font-weight:700;">Unintentional Threats</span> are down to user error and lack of awareness. Those without adequate training and knowledge about cyber security issues can inadvertently put their networks at risk by falling prey to phishing scams, exercising poor password security or sharing data on compromised devices.</span><span style="color:inherit;"><span style="font-size:18px;"><br></span></span></div><div style="color:inherit;"><span style="color:inherit;"><br></span></div><div style="color:inherit;"><div><span style="font-size:24px;">Different Types of Insider Threats</span></div><br><div><div><span style="font-size:18px;">There are several different types of insider threat:</span></div></div><br><div><span style="font-size:24px;">Second Streamers</span></div><br><div><div><span style="font-size:18px;">This refers to current employees who intentionally misuse their organisation’s confidential data, either for financial gain or while working in partnership with others. Second streamers are thought to account for about 62% of all insider threats.</span></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Angry Ex-Employees</span></div><br><div><span style="font-size:18px;">When people feel wronged, they sometimes want to seek revenge – and compromising valuable data is a great way to do it. About 29% of disgruntled ex-employees committing deliberate sabotage do so for personal financial gain, while others act purely maliciously and want to cause as much damage and disruption as possible.&nbsp;</span></div><br><div><span style="font-size:24px;">Inadvertent Insiders&nbsp;</span></div><br><div><span style="font-size:18px;">This is one of the most common types of insider threat facing organisations today, and it’s all down to user error. People often don’t realise they’ve made a mistake (such as clicking on a dodgy link or sharing financial records with a convincing fraudster) until it’s too late, which is why it’s essential for all employees to have robust, regular cyber security awareness training.&nbsp;</span></div><br><div><span style="font-size:24px;">Persistent Non-Responder</span></div><br><div><span style="font-size:18px;">If you regularly hear someone say something like “all these security measures are just a waste of time, who would want to attack us anyway?” you’re probably dealing with a persistent non responder. Anyone who consistently refuses to adopt appropriate security protocols and continues to share passwords or use insecure devices is a risk – and it’s not always who you might expect. CEOs and board members are often the worst offenders.</span></div><div><span style="font-size:18px;"><br></span></div><div><span style="font-size:18px;"><div style="color:inherit;"><div><div><span style="font-size:24px;">How to Mitigate Risk&nbsp;</span></div></div><br><div>The cyber security landscape is constantly evolving and notoriously complex, so it’s impossible to completely eliminate risk. However, by adopting a multi-layered approach and ensuring you’re completely transparent about what you expect of your employees, it’s entirely possible to significantly reduce the risk of insider threats. Here are just a few measures you can take to protect your organisation:</div><div><ul><ul><li>Undertake regular risk assessments to assess the likelihood of an attack</li><li>Ensure all staff have regular security awareness training</li><li>Maintain close management of all user permissions and ensure that leavers are immediately removed from your systems</li><li>Undertake penetration testing at least once a year</li><li>Implement 24/7 network monitoring&nbsp;</li><li>Organise a cyber security assessment/simulated phishing attack</li><li>Set up a managed detection and response system&nbsp;</li></ul></ul></div></div></span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;">Minimising the risk of insider threats doesn’t have to be hard work when you have the right team on your side. <a href="/contact-us" title="Contact" target="_blank" rel="">Contact</a> our friendly specialists at Actisoft today to find out how we can help.</span><br></div></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Start Your Free Phishing Security Test</span><br></h2></div>
<div data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ"].zpelem-heading { border-radius:1px; margin-block-start:-1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Find out what percentage of your employees are Phish-prone</span></h5></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><div><span style="color:inherit;font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><br></span></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></div></span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Jul 2022 16:39:33 +0000</pubDate></item><item><title><![CDATA[What Are Social Engineering Attacks and How Can You Prevent Them?]]></title><link>https://www.actisofttechnology.com/blogs/post/what-are-social-engineering-attacks-and-how-can-you-prevent-them</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-621493344.jpg"/> is a common tactic used by cyber criminals to manipulate people into sharing confidential information.&nbsp; Hackers exploit people’s trust, knowing ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/security-awareness-training" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1323852923.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><div><span style="font-size:18px;">is a common tactic used by cyber criminals to manipulate people into sharing confidential information.&nbsp; Hackers exploit people’s trust, knowing that when we’re under pressure we may be more likely to make mistakes. The kind of information hackers seek out varies, but commonly includes bank account details, personal information and company files.&nbsp;</span><a href="/social-engineering" title="Social engineering" target="_blank" rel=""><span style="font-size:18px;">Social engineering</span></a><span style="font-size:18px;"> is a common tactic used by cyber criminals to manipulate people into sharing confidential information.&nbsp; Hackers exploit people’s trust, knowing that when we’re under pressure we may be more likely to make mistakes. The kind of information hackers seek out varies, but commonly includes bank account details, personal information and company files.&nbsp; </span></div><span style="font-size:18px;"></span></div><br><div><span style="font-size:18px;">Hackers love to use social engineering because it’s easier to trick someone into sharing their password than to spend time trying to hack into an account. So, they lull victims into a false sense of security by gaining their trust and pretending to be someone else.&nbsp;</span></div><span style="font-size:18px;"><br></span><div><span style="font-size:18px;">Social engineering attacks take many forms, but they commonly look like emails and messages from friends and trusted organisations:</span></div></div></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div></div></div></div></div></div></div></div><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">Emails from Friends</span></div><br><div>Hackers spend a while collecting information about their targets, so if your social media followers and friends list are publicly visible it’s relatively easy for them to create fake email from a friend. These messages contain links, videos or images that include malware, so if you click on them they’ll gain instant access to your device and all your vital information.&nbsp;</div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/11.27_Phish_Your_Users_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">Emails from Organisations&nbsp;</span></div><br><div><span style="font-size:18px;">These kinds of cyberattack are known as phishing emails. Like fake friend emails, these can be very convincing and are designed to look like they’ve come from trusted sources, such as HMRC or your bank.&nbsp;</span></div><br><div><span style="font-size:18px;">Once hackers have gained a target’s trust, they will create a sense of urgency by asking for help. This might be in the form of a desperate friend being stranded in a foreign country and needing some funds to be wired to them urgently, or a financial institution asking for you to verify personal information.&nbsp; They may also send a message claiming you’re the winner of an online competition, or pretending to be your boss or co-worker asking for client details.&nbsp;</span></div><br><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">The Cost of Social Engineering&nbsp;</span></div><br><div><span style="font-size:18px;">The monetary cost of social engineering attacks on businesses vary according to different sources, from anywhere to £25,000 to upwards of £4 million.&nbsp;</span></div><br><div><span style="font-size:18px;">The biggest social engineering attack recorded to date was led by Evaldas Rimasauskas, who successfully targeted Google and Facebook. He set up a fake company and bank account, posing as a computer manufacturer who worked with the two tech giants. His team of scammers then sent phishing emails to a number of employees within Facebook and Google, attaching invoices for work that had been genuinely undertaken by the real manufacturing company.&nbsp; The money was then deposited into fraudulent accounts, and over the course of two years over $100 million was extorted.&nbsp;</span></div><br><div><span style="font-size:18px;">But perhaps the most important – and most often forgotten – impact of social engineering attacks is the <a href="https://www.actisofttechnology.com/blogs/post/the-hidden-cost-of-cyber-crime-and-how-to-avoid-it" title="human one" target="_blank" rel="">human one</a>. The guilt and shame associated with clicking on an infected email and causing huge organisational damage is too much for some people, with victims becoming depressed or developing severe anxiety. <a href="https://www.reuters.com/article/us-ashleymadison-cybersecurity-idUSKCN0QT1O720150824" title="Two people" target="_blank" rel="">Two people</a> are thought to have committed suicide following the Ashley Madison cyber-attack of 2015, and many others have lost their jobs and livelihoods.</span></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">How to Protect Yourself Against Social Engineering Attacks</span></div><br><div><span style="font-size:18px;">Since social engineers like to act when people are more likely to be under pressure, it’s important to try to stay mindful and vigilant at all times. Here are some ways you can minimise the risk of a successful attack:</span></div><br><div><ul><li><span style="font-size:18px;">Report and delete any messages that ask for financial information or passwords</span></li><li><span style="font-size:18px;">Set your spam filters to “high” and regularly check your folders to ensure no legitimate emails are in there&nbsp;</span></li><li><span style="font-size:18px;">Install robust <a href="/endpoint-protection" title="anti-virus software" target="_blank" rel="">anti-virus software</a>, <a href="/firewall" title="firewalls" target="_blank" rel="">firewalls</a> and <a href="/email-security" title="email filters" target="_blank" rel="">email filters</a> on all devices and user accounts</span><br></li><li><span style="font-size:18px;">Use <a href="/security-keys" title="multi-factor authentication" target="_blank" rel="">multi-factor authentication</a>&nbsp;and <a href="/password-manager" title="strong passwords" target="_blank" rel="">strong passwords</a>, so even if anyone does manage to get hold of your password they’ll still be asked to provide further information if their credentials aren’t familiar</span><br></li><li><span style="font-size:18px;">Double check all email addresses claiming to be from friends or trusted sources before you respond – particularly if they contain links or ask for information</span></li><li><span style="font-size:18px;">Be wary of tempting offers – if it looks too good to be true, it probably is</span></li><li><span style="font-size:18px;">If in doubt, stop. Taking a few minutes to check whether something is legitimate is a lot less time consuming than clicking a link in haste</span></li></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;">To find out more about how to keep your organisation safe, <a href="/contact-us" title="contact" target="_blank" rel="">contact</a> our friendly team of Cyber Security specialists at Actisoft Technology today.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Start Your Free Phishing Security Test</span><br></h2></div>
<div data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zdf2go9Bp_5oSFUJ4J-rOQ"].zpelem-heading { border-radius:1px; margin-block-start:-1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Find out what percentage of your employees are Phish-prone</span></h5></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Did you know that 91% of successful data breaches started with a spear phishing attack?</div><br><div>Find out what percentage of your employees are Phish-prone™ with your free phishing security test. Plus, see how you stack up against your peers with the new phishing Industry Benchmarks!</div><div><br></div><div>IT pros have realised that simulated phishing tests are urgently needed as an additional security layer. Today, phishing your own users is just as important as having antivirus and a firewall. It is a fun and an effective cybersecurity best practice to patch your last line of defence: USERS</div><div><br></div><div><div><span style="color:inherit;font-style:italic;font-weight:700;">Why? If you don't do it yourself, the bad guys will.</span><br></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page&nbsp;</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;font-weight:700;">The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><br></span></div><div style="color:inherit;"><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><div>Start phishing your users now. Fill out the form, and get started immediately!</div></div></span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 01 Jul 2022 09:47:38 +0000</pubDate></item><item><title><![CDATA[National Health Service Becomes the Latest Victim of a Credential Harvesting Phishing Operation]]></title><link>https://www.actisofttechnology.com/blogs/post/national-health-service-becomes-the-latest-victim-of-a-credential-harvesting-phishing-operation</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-133940537.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Part of a six-month attack, email accounts on the NHS’ Microsoft 365 instance were compromised, resul ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_EHQ823Rwygf6lLmxLBfRrA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EHQ823Rwygf6lLmxLBfRrA"].zpelem-text { border-radius:1px; margin-block-start:4px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 403.50px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:403.50px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:403.50px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-627319476.jpg" width="500" height="403.50" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">Part of a six-month attack, email accounts on the NHS’ Microsoft 365 instance were compromised, resulting in over 1,100 targeted email attacks used to obtain more credentials.</span></div><div><br></div><div><a href="https://www.inky.com/en/blog/fresh-phish-britains-national-health-service-infected-by-massive-phishing-campaign" title="According to security researchers at email protection vendor Inky" target="_blank" rel=""><span style="font-size:18px;">According to security researchers at email protection vendor Inky</span></a><span style="font-size:18px;">, the 139 compromised NHS accounts were being misused from October 2021 until March of 2022 as the cornerstone of further <a href="/what-is-phishing" title="phishing" target="_blank" rel="">phishing</a> attacks attempted to either harvest credentials to major online platforms, or to trick victims into providing banking details.</span></div><div><br></div><div><span style="font-size:18px;">Emails were likely sent using two IP addresses serving as SMTP relays for the NHS’ 27,000+ users, allowing attackers to work remotely. What may have allowed this attack to remain undetected for 6 months was the number of emails being sent:</span></div></div></div></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
<div data-element-id="elm_eu3MIDHjwMRWhrTCWe25Fw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eu3MIDHjwMRWhrTCWe25Fw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VGVIOy5o9lPHEX0Wb_GfYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_VGVIOy5o9lPHEX0Wb_GfYw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_dCWc0QdV68asiqiV3b5KvA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"] .zpimage-container figure img { width: 539px !important ; height: 300px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"] .zpimage-container figure img { width:539px ; height:300px ; } } @media (max-width: 767px) { [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"] .zpimage-container figure img { width:539px ; height:300px ; } } [data-element-id="elm_dCWc0QdV68asiqiV3b5KvA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Graph.png" width="539" height="300" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_RoWw9J3Fe4AiolJ-MLRB_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RoWw9J3Fe4AiolJ-MLRB_Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>You’ll note the dramatic spike in the number of emails sent in March of this year, likely drawing attention to the attack.</div><div><br></div><div>Emails impersonated both the NHS and individuals within, using NHS email footers, and names of compromised individuals to add credibility to the scams.</div></div></div>
</div><div data-element-id="elm_wkfgogqnTa5_50I8NC6gxg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"] .zpimage-container figure img { width: 521px !important ; height: 300px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"] .zpimage-container figure img { width:521px ; height:300px ; } } @media (max-width: 767px) { [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"] .zpimage-container figure img { width:521px ; height:300px ; } } [data-element-id="elm_wkfgogqnTa5_50I8NC6gxg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Email-1.png" width="521" height="300" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_FoHXYUHymQig9-_efNgt2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FoHXYUHymQig9-_efNgt2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"] .zpimage-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"] .zpimage-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"] .zpimage-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_5BdOvddsPJZo98A0Zq4Vdg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_4_NtXtcU7srGA2bbxlSHRA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4_NtXtcU7srGA2bbxlSHRA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>While there were only 139 compromised email accounts (out of over 27,000, according to the NHS), it literally only takes a single phishing email to alter the course of an individual or an organisation. Because most phishing scams need to get the victim to focus on one response action (e.g., clicking a link or opening an attachment), the scams can generally be identified pretty easily, if the user is vigilant.</div><br><div><div>And this vigilance comes with education through <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> designed to help users understand the nature of phishing attacks, social engineering techniques, and the role they play in corporate cybersecurity.</div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Free <span style="font-weight:700;">Phishing Security Test</span></span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div></div></div>
</div><div data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:24px;font-weight:700;">Here's how it works:</span></p><div style="color:inherit;"><div><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></div></div></div>
</div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 16 Jun 2022 15:30:26 +0000</pubDate></item><item><title><![CDATA[Top Cyber Threats to SMEs]]></title><link>https://www.actisofttechnology.com/blogs/post/top-cyber-threats-to-smes-in-2022....and-more-than-likely-beyond</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-479801072 -1-.jpg"/>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber crimin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber criminals. But the truth is, small organisations are just as much at risk of hacks and other security threats as huge corporations – in fact, being smaller may make you more of a target.&nbsp;</div><br><div>Attackers are targeting thousands of businesses every day, and those with less robust defences in place make much easier prey than bigger organisations who can invest more time and money into cyber security.&nbsp;</div><br><div><div>Hackers also love <a href="https://www.webroot.com/blog/2022/02/10/3-reasons-we-forget-small-midsized-businesses-are-major-targets-for-ransomware/" title="targeting small businesses" target="_blank" rel="">targeting small businesses</a> because they often deal with large sums of money and have great contacts – which means there’s lots of lovely data to steal.</div></div><br><div>It's often said that knowledge is power, and that’s certainly true when it comes to cyber-crime. The owners and managers of SMEs need to be aware of the risks, which is why we’ve put together this short article outlining the most common cyber-attacks right now and what we have seen.</div></div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 531.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-679718274.jpg" width="500" height="531.41" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;font-weight:400;">1) Phishing&nbsp;</span></div><br><div><span style="font-size:18px;">By far the most prevalent – and damaging – threat facing small and medium sized businesses in 2022 is phishing. These attacks account for 90% of all breaches; a figure that’s grown by 65% since 2021. Phishing attacks are when a hacker sends an email pretending to be from trusted contact, tricking the recipient to click on a malicious link, download a code or share sensitive information. There are several types of phishing attacks you need to know about:</span></div><br><div><ul><li><span style="font-size:18px;">The spray and pray approach, which is where hackers send out thousands of emails all at once, in the hope that one or two will bite</span></li><li><span style="font-size:18px;">Spear phishing: a campaign that targets a particular person or organisation and includes information which is known to be of interest to the specific target</span></li><li><span style="font-size:18px;">Whaling: an even more targeted and carefully executed attack, where the hacker goes after a specific C level executive in the organisation&nbsp;</span></li></ul></div><br><div><span style="font-size:18px;">Phishing attacks are becoming increasingly sophisticated, which means that even if you think you’ve seen it all before, you could still be caught out.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-693352614.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">2) Ransomware&nbsp;</span></div><br><div><span style="font-size:18px;">Ransomware is a type of malicious software which prevents or restricts users from accessing their computer systems and data, commonly by locking their screens and/or files until they pay a ransom. Like other cyber-attacks, ransomware technology has become more sophisticated over recent years. A popular attack at the moment is a breed of ransomware known as “cryptoransomware” where files are encrypted and users are forced to send an online payment in return for a decryption code.</span></div><br><div><span style="font-size:18px;">Hackers will push for payments in all sorts of ways, though. The costs vary according to the type of ransomware being used and different exchange rates. Users are often asked to pay their ransoms in bitcoin, because it offers a greater level of anonymity, but hackers also list alternative options such as Amazon gift cards or iTunes vouchers. Sometimes it seems like an easy option to just pay up, but it should be noted that paying the ransom is no guarantee your files will be returned.</span></div></div></div></div>
</div></div><div data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-621493344.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">3) Social Engineering&nbsp;</span></div><br><div><div><span style="font-size:18px;">Social engineering <a href="https://blog.knowbe4.com/we-do-not-talk-enough-about-social-engineering-and-its-hurting-us" title="plays a huge role" target="_blank" rel="">plays a huge role</a> in cyber-crime. Even though advances in technology have been behind more sophisticated attacks, those attacks can only be properly deployed by a human. So, hackers work hard to understand how people think and manipulate them into making security mistakes or sharing valuable data. Social engineering happens in several phases. First, the hacker investigates their victim and identifies any weaknesses in their security systems. Next they start to gain their trust, either by sharing information the victim might be interested in or by pretending to be a trusted contact. Then, when the target lets their guard down and begins to trust the hacker, they’ll go in for the kill.&nbsp;</span></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1323852923.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">4) Insider Threat&nbsp;</span></div><br><div><div><span style="font-size:18px;">Insider threats are posed by individuals from inside an organisation. This can include current or previous staff members, partners and contractors with access to passwords and company data. These individuals may act maliciously, intentionally stealing data or infiltrating systems for personal gain, but often they’re completely unwitting. Lack of awareness about cyber security issues can turn the most diligent worker into an insider threat, so it’s important to have robust policies and training measures in place.&nbsp;</span></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width: 300px !important ; height: 250px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } @media (max-width: 767px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-300x250.jpg" width="300" height="250" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">5) Shadow IT</span></div>
<br><div><span style="font-size:18px;">Shadow IT is a term covering the use of different IT systems, apps, services and devices that haven’t been approved by an IT department. Since Cloud services have become more popular, and also since the first lockdown, the use of Shadow IT has grown exponentially. New technology drives innovation and can deliver huge cost and time savings, but without the right security measures in place it also poses a huge risk. </span></div>
<br><div><br></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div>
</div></div></div></div></div><div data-element-id="elm_YMPka8PIM1yThWWIy9D0NA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-864427926.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">6) Software Exploits</span></div><br><div><div><span style="font-size:18px;">A software exploit is a code that’s been written to take advantage of a particular vulnerability or flaw in a piece of software. Although security professionals sometimes develop these exploits as evidence of vulnerabilities, they’re also widely used by hackers with malicious intent.&nbsp;</span></div></div><br><div><br></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">The purpose of this article is to provide you with an overview of the most common threats to your organisation. We’ll go into more detail about each type (and a few others!) in our next articles. In the meantime, if you want to know more about how to protect your SME from cyber threats, get in touch!</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 10 Jun 2022 11:13:34 +0000</pubDate></item><item><title><![CDATA[Zero-Day Attacks: What Are They, Who's at Risk and How to Avoid Them]]></title><link>https://www.actisofttechnology.com/blogs/post/zero-day-attacks-what-are-they-whos-at-risk-and-how-to-avoid-them</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1195574782.jpg"/>Zero-day attacks are on the rise, with events reaching an all-time high in 2021. But what exactly is a zero-day attack, and how can you avoid it wreak ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Zero-day attacks are on the rise, with events reaching an all-time high in 2021. But what exactly is a zero-day attack, and how can you avoid it wreaking havoc for your organisation?&nbsp;</div><br><div>Zero-Day is a generic term which describes a cyber threat that’s just been discovered. When a vendor or developer finds out about the flaw they have to fix it immediately, meaning they have “zero days” in which to act. It’s sometimes written as 0 Day, and a range of different words are used alongside, including attack, vulnerability and exploit</div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-936338884.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">Let’s take a quick look at each one individually, because there are some important&nbsp; differences.&nbsp;</span></div><div><ul><li><span style="font-size:18px;">Zero-Day Vulnerabilities are flaws in software that attackers discover before vendors know anything about them. Because those vendors are blissfully unaware, they haven’t yet been able to create the necessary patches to keep them safe.</span></li><li><span style="font-size:18px;">Zero-Day Exploits refer to the methods hackers use to make the most of those vulnerabilities, and:</span></li><li><span style="font-size:18px;">Zero-Day Attacks are the next step, when hackers take action and steal data from vulnerable systems</span></li></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div><div><span style="color:inherit;font-size:20px;font-weight:700;">How Do Zero-Day Attacks Work?&nbsp;</span></div></div><div style="color:inherit;"><div style="color:inherit;"><div><br></div><div><span style="font-size:18px;">You’ve probably heard of patches; solutions that fix problems that arise as the result of software updates. Developers are always on the lookout for these problems, but unfortunately, so are hackers. So, if the attacker gets their first, developers find themselves in a race against time.&nbsp;</span></div><br><div><span style="font-size:18px;">Attackers come in a number of forms, the most common being cyber criminals who are in it to make money. Other Zero Day attackers are:&nbsp;</span></div><br><div><span style="font-size:18px;"><span style="font-weight:700;">Hacktivists:</span> hackers who are motivated by social or political causes and want to raise awareness of their beliefs</span></div><br><div><span style="font-size:18px;"><span style="font-weight:700;">Corporate Spies:</span> these people engage in espionage on behalf of organisations looking for information – often about their competitors</span></div><br><div><span style="font-size:18px;"><span style="font-weight:700;">Countries and Political Bodies</span> engaging in Cyberwarfare</span></div><br><div><span style="font-size:18px;">Once hackers identify a vulnerability, they will quickly write and develop a code (known as an “exploit code”) that enables them to take advantage of it. The most common way they do this is through phishing emails, which look like they’ve been sent from a trusted source. The message will ask the recipient to click on a link, visit a website or download malicious software. Once the code has been deployed, victims are open to a vast range of cyber-attacks, including identity theft.&nbsp;</span></div><br><div><span style="font-size:18px;">Hackers will be constantly looking for vulnerabilities to exploit, and they can also buy them on the dark web. Depending on the software and the type of data that can be obtained, these exploits are hugely valuable – in 2018, the average cost was around £2,000. Cyber criminals sometimes act straight away, but they may just sit and wait for the best time to attack.&nbsp;</span></div><br><div><span style="font-size:18px;">As soon as developers are made aware of a vulnerability, they will try to patch the software in order to prevent an attack. Unfortunately, it can take days, weeks or months for these vulnerabilities to present themselves – and be fixed.&nbsp;</span></div><br><div><span style="font-size:18px;">As soon as an exploit has been identified and patched, it’s no longer seen as a Zero-Day threat.</span></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:20px;font-weight:700;">Common Targets&nbsp;</span></div><span style="color:inherit;font-size:18px;"><div style="color:inherit;"><span style="color:inherit;"><br></span></div>If your system has been infiltrated, you might start noticing things like unexpected traffic, and suspicious scans and log-ins. It’s not always easy to spot a Zero-Day vulnerability, especially if you’re not in the know, but here are a few things that developers look out for:</span></div></div><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Missing data encryption</span></li><li><span style="font-size:18px;">Broken links and algorithms</span></li><li><span style="font-size:18px;">Bugs&nbsp;</span></li><li><span style="font-size:18px;">Missing authorisation information&nbsp;</span></li></ul></div><br><div><div><span style="font-size:20px;font-weight:700;">How to Prevent an Attack</span></div></div><br><div><span style="font-size:18px;">By their very definition, Zero-Day attacks are impossible to patch. However, there are some methods that can be used to prevent them happening in the first place. These include vulnerability scanning, patch management software and input validation, which all help you spot threats in real time.&nbsp;</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">One of the most effective and popular ways to prevent a Zero-Day attack is with a good web application firewall, which helps filter out unwelcome visitors and identify weak spots. We can help with all of the above, as well as offering a range of other systems and services to help protect your organisation from common cyber-attacks. Contact our team of cyber security specialists here at Actisoft Technology to find out more.</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 May 2022 11:00:14 +0000</pubDate></item><item><title><![CDATA[Verizon: Ransomware Involved in 25% of Data Breaches as Credentials and Phishing are Seen as Key Paths for Attack Success]]></title><link>https://www.actisofttechnology.com/blogs/post/verizon-ransomware-involved-in-25-of-data-breaches-as-credentials-and-phishing-are-seen-as-key-paths</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/g3a6405af135284aa2f977ae306dd6194a999bf1c3e350a799fade83ecbd8f4d967825d837044c5d49fae4be6117d6ca2d37bb0d432838e7414c0713060ba0679_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman With the much-anticipated annual Verizon Data Breach Investigations Report finally released, we get a ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_EHQ823Rwygf6lLmxLBfRrA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EHQ823Rwygf6lLmxLBfRrA"].zpelem-text { border-radius:1px; margin-block-start:-6px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-502758397.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:18px;">With the much-anticipated annual Verizon Data Breach Investigations Report finally released, we get a view of <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> from the data breach perspective that points to a common weakness in your security strategy.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</span></div><span style="font-size:18px;"></span><div><br></div><div><span style="font-size:18px;">When it comes to the state of your organisation’s ability to protect itself against cyberattacks – and ransomware, specifically – I truly don’t want to be the one that says “I told you so.” But the new data in Verizon’s <a href="https://www.verizon.com/business/resources/reports/dbir/" title="Data Breach Investigations Report" target="_blank" rel="">Data Breach Investigations Report</a> paints a pretty conclusive picture around why ransomware attacks are so successful.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</span></div><span style="font-size:18px;"></span><div><br></div><div><span style="font-size:18px;"> First off, I need to point out that while 25% of data breaches involve ransomware, that number is nearly double what Verizon found in 2020 – demonstrating that, from the data breach perspective, we’re seeing ransomware attacks begin to encroach themselves as a dominant factor in data breaches (and will likely continue to do so). </span></div><span style="font-size:18px;"></span><div><br></div><div><span style="font-size:18px;"> So, what’s helping ransomware-involved data breaches be so successful? In a word… users. </span></div>
<div><br></div><div><span style="font-size:18px;"> According to Verizon, 82% of data breaches (ransomware included) involve “the human element” (which Verizon cites as including “Use of stolen credentials, Phishing, Misuse, or simply an Error”). Take a look at the chart below from the report, showing the action varieties found within ransomware-involved incidents:</span></div></div></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div><div data-element-id="elm_6J84Al_Ge8AzWrCjPp_DpA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_6J84Al_Ge8AzWrCjPp_DpA"] .zpimage-container figure img { width: 916px !important ; height: 514px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_6J84Al_Ge8AzWrCjPp_DpA"] .zpimage-container figure img { width:916px ; height:514px ; } } @media (max-width: 767px) { [data-element-id="elm_6J84Al_Ge8AzWrCjPp_DpA"] .zpimage-container figure img { width:916px ; height:514px ; } } [data-element-id="elm_6J84Al_Ge8AzWrCjPp_DpA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Graph.png" width="916" height="514" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_hqvJNos6zjzONZEdwB75EQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_hqvJNos6zjzONZEdwB75EQ"] .zpimagetext-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_hqvJNos6zjzONZEdwB75EQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_hqvJNos6zjzONZEdwB75EQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_hqvJNos6zjzONZEdwB75EQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:18px;">What you should notice is that three of the four (desktop sharing software, direct install, and email) all imply access to either a user’s endpoint or their web-based email. And how does one get such access? Usually through <a href="/what-is-phishing" title="phishing attacks" target="_blank" rel="">phishing attacks</a> intent on either compromising credentials (in the case of email) or the user’s endpoint (in the case of desktop sharing software and direct install).&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</span></div><span style="font-size:18px;"></span><div><br></div><div><span style="font-size:18px;"> Verizon calls credentials and phishing two of “the four key paths leading to your estate” (in addition to exploiting vulnerabilities and botnets). They go on to state “These four pervade all areas of the DBIR, and no organisation is safe without a plan to handle them all.” </span></div><span style="font-size:18px;"></span><div><br></div><div><span style="font-size:18px;"> Let’s sum this one up, shall we? </span></div><div><br></div><div><span style="font-size:18px;">Ransomware is on the rise, users are involved somehow in a majority of all data breaches, threat actors gain access to endpoints and email, and phishing pervades all of this. Seems to me that the issue here (when you rewind the clock back to the initial threat actions that allow these ransomware incidents to occur) is users falling prey to phishing attacks – something easily either reduced or remedied with <a href="/security-awareness-training" title="Security Awareness Training." target="_blank" rel="">Security Awareness Training.</a></span></div>
<div><br></div><div><span style="font-size:18px;"> There’s no more respected or trusted report out there than the Verizon DBIR. So if Verizon is telling you users are the key to successful ransomware attacks, and that phishing is one of the keys to your kingdom, you need to be doing something about it to mitigate the user risk that exist within your organisation.</span></div></div></div>
</div></div></div></div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Free <span style="font-weight:700;">Phishing Security Test</span></span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></div></div></div>
</div><div data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width: 300px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width:300px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"] .zpimagetext-container figure img { width:300px ; height:254px ; } } [data-element-id="elm_bHV1CvcMbGdUPVPZ-q6zEA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" width="300" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:24px;font-weight:700;">Here's how it works:</span></p><div style="color:inherit;"><ul><li><span style="font-size:18px;">Immediately start your test for up to 100 users (no need to talk to anyone)</span></li><li><span style="font-size:18px;">Select from 20+ languages and customise the phishing test template based on your environment</span></li><li><span style="font-size:18px;">Choose the landing page your users see after they click</span></li><li><span style="font-size:18px;">Show users which red flags they missed, or a 404 page</span></li><li><span style="font-size:18px;">Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</span></li><li><span style="font-size:18px;">See how your organisation compares to others in your industry</span></li></ul></div></div>
</div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 May 2022 16:14:08 +0000</pubDate></item><item><title><![CDATA[Eight Top Tips for Managing Risk in Your Organisation]]></title><link>https://www.actisofttechnology.com/blogs/post/eight-top-tips-for-managing-risk-in-your-organisation</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1573165231977-3f0e27806045?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDV8fGJvYXJkJTIwbWVldGluZ3xlbnwwfHx8fDE2NTM1NzQ5OTY&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Technology presents us with opportunities that even just a few years ago would have seemed impossible, but with those opportunities come a whole new s ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Technology presents us with opportunities that even just a few years ago would have seemed impossible, but with those opportunities come a whole new set of risks. So, how do you strike a balance? We’ve put together a list of habits to help you embrace the digital revolution and minimise risks.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 375.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:375.00px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:375.00px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/group-of-business-people-interacting-picture-id475843853.jpg" width="500" height="375.00" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">1) </span><span style="font-size:24px;"><span style="font-size:24px;">Make </span>Sure You Know Your Business Inside Out</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div>In order to properly manage risks, you need to first have a clear picture of what you’re working with. Once you have a detailed list of all your critical assets, technologies (including all devices), objectives and processes, you’ll be able to get a better idea of vulnerabilities – and how to tackle them.</div><br><div><div><span style="font-size:24px;">2) Prioritise Tasks According to Risk</span></div></div><br><div>It might feel a bit overwhelming trying to work out where to start, which is why a thorough inventory is worth its weight in gold. Once you’ve identified all the devices and processes you use, do a risk assessment for each one and prioritise your task list according to your findings.&nbsp;</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="font-size:24px;">3) Understand What Your Stakeholders and Board Members Want</span></div>
</div><br><div>Most boards and customers are asking more questions about data security now, so you’ll need to be prepared to answer their questions and provide accurate reports. Take the time to build relationships with your stakeholders and listen to their concerns and draw up a risk report based on their needs. Ask your board how often they want to be updated and what level of detail they want – in most cases, they won’t need to understand the minutiae of how you’re handing every risk, as long as you can prove you’ve thought about all eventualities and are being proactive.&nbsp;</div>
<br><div><div><span style="font-size:24px;">4) Follow Industry Best Practice and National Standards&nbsp;</span></div>
</div><br><div>Drawing up a risk management strategy can be time consuming, and your time is precious, so don’t stress yourself by trying to reinvent the wheel. Take a look at best practice in your industry and do some research into how other businesses in your sector are managing risk, then adapt it accordingly to suit your own organisational requirements.&nbsp;</div>
<br><div><div style="color:inherit;"><div><div><span style="font-size:24px;">5) Create a Resilient System&nbsp;</span></div>
</div><br><div>Any IT expert will tell you that prevention is much better than cure,&nbsp; so it’s all about being proactive and resilient. Ransomware continues to be a big threat for industries across the board, but it’s actually pretty easy to manage with the right software and processes in place. That said, there’s no silver bullet that offers guaranteed protection against all cyber threats, so you’ll also need a robust incident response plan in place to ensure that if your data does become compromised you can get back up and running quickly and cost effectively.</div>
</div></div></div></div></div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div><span style="font-size:24px;">6) Promote a Culture of Awareness</span></div></div><br><div><span style="font-size:18px;">You can invest a fortune in anti-virus software, but the most important part of your cyber security toolkit is arguably your people. Hackers can only infiltrate your system if someone lets them in, so invest in good training and keep your staff up to date on common risks and how to spot them.&nbsp;</span></div><br><div><div><span style="font-size:24px;">7) Make Informed Decisions</span></div></div><br><div><span style="font-size:18px;">There are lots of different types of software out there that all claim to offer all singing, all dancing protection against cyber-attacks. But just because a brand claims to be good, there’s no guarantee they will be, so take your time to ask questions, read (genuine) reviews and work out what you really need. Never assume&nbsp; systems, people and processes can be trusted until you’ve done your homework.</span></div><br><div><div><span style="font-size:24px;">8) Know Your Enemy&nbsp;</span></div></div><br><div><span style="font-size:18px;">Sun Tsu wrote about it centuries ago in The Art of War, and it’s still relevant now – when you understand who your adversaries are know how they behave, you’ve got a much greater chance of winning the battle. It’s essential to make security awareness an intrinsic part of everything you do and keep on top of the latest cyber crime trends and tactics – or, if you really can’t stand getting bogged down in such things, you invest in a good ally who will fight on your behalf.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">To find out more about how to manage risk in your organisation, <a href="/contact-us" title="contact" target="_blank" rel="">contact</a> our friendly team of specialists here at Actisoft Technology today!</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 May 2022 14:23:25 +0000</pubDate></item><item><title><![CDATA[What is the Fourth Industrial Revolution?]]></title><link>https://www.actisofttechnology.com/blogs/post/what-is-the-fourth-industrial-revolution</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1043199056.jpg"/>As the cyber threat landscape continues to evolve, passwords and anti-virus software simply aren’t enough anymore. And while there’s no silver bullet ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">As the cyber threat landscape continues to evolve, passwords and anti-virus software simply aren’t enough anymore. And while there’s no silver bullet that totally eliminates all attacks, employing a Multi Layered Defence will definitely help.</span><br></p></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/defence-in-depth" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/iStock-1376360671.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>The Fourth Industrial Revolution, also known as 4IR and Industry 4.0, is a term used to describe a new amalgamation of the physical, biological and digital worlds. It combines engineering with science, Artificial Intelligence (AI), robotics, quantum computing, the Internet of Things (IoT) and other emerging technologies. Together, these new systems, processes and tools are completely changing the world around us – and the way we live in it.&nbsp;</div><br><div>It may sound like the stuff of sci-fi movies, but most of us have been using at least some of these services for a while. Sat Navs, mobile banking apps, iPhone face scans and tools like Alexa are a common part of daily life. But it’s perhaps in the workplace that the 4IR is having the biggest impact; disrupting every business sector at an unprecedented pace.&nbsp;</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"] .zpimageheadingtext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"] .zpimageheadingtext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"] .zpimageheadingtext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">A Brief History of Industrial Revolutions&nbsp;</span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;">Most people are aware of the first Industrial Revolution, which took place in the 18th Century. It was prompted by the invention of the steam engine, and with these new machines came new opportunities and huge social, cultural and economic changes. The second revolution saw the invention of electricity, mass production and other big scientific improvements, and the third saw the birth of computers and digital devices such as clocks.&nbsp;</span></div><br><div><span style="font-size:18px;">In 2016, the founder of the World Economic Forum Klaus Schwab wrote a book entitled The Fourth Industrial Revolution, which outlined the effects&nbsp; - good and bad - that technological innovation is having on the world.&nbsp;</span></div><div><br></div><div><span style="font-size:18px;"><div><span><span style="color:inherit;font-size:24px;">These technologies include:</span><br></span></div></span></div><div><span style="color:inherit;font-size:18px;"><br></span></div><div style="color:inherit;"><div><span style="font-size:18px;"><span style="font-weight:700;">Blockchain:</span> Often confused with cryptocurrency, blockchain is actually a type of storage facility that enables cryptocurrency such as Bitcoin to be created and exchanged in monetary terms.</span></div><br><div><span style="font-size:18px;"><span style="font-weight:700;">Biotechnology:</span> This kind of technology merges tech with biology. It’s particularly prevalent in the pharmaceuticals industry, because it allows scientists to develop cellular and biomolecular processes for the production of new drugs, among other things. It’s also used in manufacturing and is making great strides in the production of greener, more efficient energy.&nbsp;</span></div><br><div><div><span style="color:inherit;font-size:18px;"><span style="font-weight:700;">Virtual Reality (VR) and Augmented Reality (AR):</span> VR is all about immersive digital experiences that simulate the world around us (currently via a headset) whereas AR is a combination of the physical and digital worlds, such as mobile apps that allow us to add filters and change the appearance of selfies.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div><span style="font-size:18px;"><span style="font-weight:700;"><a href="https://www.mark3d.com/en/guides/#introduction" title="3D Printing:" target="_blank" rel="">3D Printing:</a></span> Printers have come a long way in the past few years, and today’s 3D versions enable users to create actual objects based on an image. Manufacturers can now print their own parts, while in the medicine world prosthetic limbs, tissues and even organs are now being produced.</span></div></div><br><div><div><span style="font-size:18px;"><span style="font-weight:700;">Robotics:</span> The sci-fi books of the 1960s often spoke about the possibility of robots taking over the world, and with the latest developments it doesn’t seem like such a far-fetched notion! While we’re a long way from having walking, talking and free-thinking robots in every home, they’re becoming increasingly advanced and playing an important role in everything from manufacturing to health and safety.</span></div></div><br><div><div><span style="font-size:18px;"><span style="font-weight:700;">The Internet of Things/IoT:</span> This is a term that covers a huge range of devices, from smart mobile phones and security cameras to wearable health and fitness devices, smart phones, smart fridges, thermostats and mobile devices.&nbsp;</span></div></div><br><div><span style="font-size:18px;">Other technologies included in the Fourth Industrial Revolution include data storage, Cloud computing, cyber security technology, renewable energy…and much more.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_mXKxCVrDvRjN9Ju_v5jesg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mXKxCVrDvRjN9Ju_v5jesg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">The Impact on Businesses</span></div><br><div>There’s no doubt that the Fourth Industrial Revolution is having a huge effect on businesses everywhere. Although many worry that the increased role of technology could be bad news for humans, we’re nowhere near that yet. In fact, the 4IR is all about combining humanity with technology to create better experiences for us all – particularly customers. modern technology gives businesses the power to connect with people far more effectively than ever before, because it presents us with the data we need to really understand each other.&nbsp;</div><br><div>That said, because there’s so much more choice available these days, customers have higher expectations, which means more pressure on businesses to get with the programme in terms of their digital offerings. Customers also have more control of their own personal data too, and with the advent of the GDPR&nbsp; organisations of all sizes must be doing everything they can to keep client information safe. That means having robust cyber security processes and tools in place and ensuring all staff understand common risks, and how to avoid them.</div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">To find out more about how you can embrace the Fourth Industrial Revolution without putting your customer’s data at risk, get in touch. As cyber security specialists we help our clients make the most of modern technology whilst protecting them from viruses, hacks and other cyber-attacks. Find out more today!</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 May 2022 14:32:18 +0000</pubDate></item><item><title><![CDATA[Multi-Layered Defence]]></title><link>https://www.actisofttechnology.com/blogs/post/multi-layered-defence</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1370845936.jpg"/>As the cyber threat landscape continues to evolve, passwords and anti-virus software simply aren’t enough anymore. And while there’s no silver bullet ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">As the cyber threat landscape continues to evolve, passwords and anti-virus software simply aren’t enough anymore. And while there’s no silver bullet that totally eliminates all attacks, employing a Multi Layered Defence will definitely help.</span><br></p></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/defence-in-depth" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/iStock-1376360671.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="color:inherit;font-size:24px;">What do we mean by Multi-Layered Defence?</span><span style="color:inherit;"><span style="font-size:24px;"><br></span></span></div><div><span style="color:inherit;"><br></span></div><div><span style="font-size:18px;"><span style="color:inherit;">Also known as <a href="/defence-in-depth" title="Defence-in-Depth" target="_blank" rel="">Defence-in-Depth</a> and Layered Security, Multi-Layered Defence is an approach to network security that uses a variety of tools. The aim is to keep all bases covered by ensuring every individual aspect of your cyber security strategy has a backup to protect against vulnerabilities. Think of it in the same way as keeping your house secure – you can lock your doors and close your windows, but your home will be even safer if you’ve also got a burglar alarm and security cameras installed. When you’ve got an arsenal of protection working together against hackers and other threats, your business will be more secure too.</span><br></span></div><div><br></div><div><span style="font-size:18px;">Multi-Layered Defence is recognised as Best Practice, as recommended by the National Institute of Standards and Technology (NIST) Cyber Security Framework. The framework outlines five key areas to help businesses protect their systems and data:</span></div><div style="color:inherit;"><div><ul><li><span style="font-size:18px;">Identify</span></li><li><span style="font-size:18px;">Protect</span></li><li><span style="font-size:18px;">Detect</span></li><li><span style="font-size:18px;">Respond</span></li><li><span style="font-size:18px;">Recover</span></li></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"] .zpimageheadingtext-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"] .zpimageheadingtext-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"] .zpimageheadingtext-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_IreWTLMAy4lEFjAs4HCHQA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-reply-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/4-16-19_PRT_Banner_160x600.jpg" width="160" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-family:&quot;PT Sans&quot;;">Networks can be defended by implementing twelve essential layers, as outlined below.</span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:18px;"><span style="font-weight:700;"><a href="/firewall" title="1) Firewalls:" target="_blank" rel="">1) </a></span><span style="font-weight:700;"><a href="/firewall" title="1) Firewalls:" target="_blank" rel="">Firewalls:</a></span> A firewall is commonly the first line of defence in an organisation’s network security, acting as a barrier between the network and any unsolicited traffic.&nbsp;</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div><div><span style="font-size:18px;"><span style="font-weight:700;">2) Patch Management:</span> Hackers are always on the lookout for vulnerabilities, and outdated software often provides them with the perfect way in. Patch management is essential because it means errors and bugs can be easily identified and fixed, making it far harder for cyber criminals to strike.&nbsp;</span></div></div><br><div><div><span style="font-size:18px;"><span style="font-weight:700;">3) Multi-Factor Authentication:</span> An MFA is an electronic automation method that requires users to be verified in two or more ways before they’re granted access to particular networks, applications and websites.&nbsp; Users are asked to provide information on:</span></div></div><br><div><ul><ul><li><span style="font-size:18px;">Something they know (e.g., a password or PIN)</span></li><li><span style="font-size:18px;">Something they have (a physical object, like a card, <a href="/security-keys" title="security key" target="_blank" rel="">security key</a> or mobile device)</span><br></li><li><span style="font-size:18px;">Something they are&nbsp; (this method uses biometric verification, such as fingerprints, voice recognition and retina scans). While it may sound like a lot to ask a user, these solutions have been developed so effectively and efficiently that they’re easy to use and cause minimal disruption.&nbsp;</span><br></li></ul></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div></div><div data-element-id="elm_A1QoO-f5O0Co97QGobPxHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A1QoO-f5O0Co97QGobPxHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="font-size:14px;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div><span style="font-size:18px;"><span style="font-weight:700;"><a href="/endpoint-protection" title="4) Endpoint Protection:" target="_blank" rel="">4) Endpoint Protection:</a></span> Today’s businesses have a lot of different devices logging onto their networks, which significantly increases security risks. Every phone, laptop, PC , camera, printer, scanner and smart device (known as “endpoints”) must be individually protected as part of your cyber security strategy.&nbsp;</span></div></div><br><div><div><span style="font-size:18px;"><span style="font-weight:700;"><a href="/dns-protection" title="5) Content Filtering:" target="_blank" rel="">5) Content Filtering:</a></span> There’s an enormous amount of web content out there, and if just one of your users happens to access a dangerous website your entire network could be compromised. Web content filtering allows you to block inappropriate or untrusted sources that could put you at risk of cyber-attacks.&nbsp;</span></div></div><br><div><div><span style="font-size:18px;"><span style="font-weight:700;"><a href="/email-security" title="6) Email Filtering:" target="_blank" rel="">6) Email Filtering:</a></span> The vast majority of cyber-attacks&nbsp; - 94% to be precise - are still delivered by email. Hackers know all it takes is one click on a dodgy link for an entire network to be compromised, so by filtering emails before they arrive in users’ inboxes you can help stop them in their tracks.&nbsp;</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_inznfezw_nuLqSfyOFQ9zw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_inznfezw_nuLqSfyOFQ9zw"] .zpimage-container figure img { width: 1095px ; height: 918.81px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_inznfezw_nuLqSfyOFQ9zw"] .zpimage-container figure img { width:723px ; height:606.67px ; } } @media (max-width: 767px) { [data-element-id="elm_inznfezw_nuLqSfyOFQ9zw"] .zpimage-container figure img { width:415px ; height:348.23px ; } } [data-element-id="elm_inznfezw_nuLqSfyOFQ9zw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/defence-in-depth" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Defence%20in%20Depth.png" width="415" height="348.23" loading="lazy" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_mXKxCVrDvRjN9Ju_v5jesg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mXKxCVrDvRjN9Ju_v5jesg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div><span style="font-weight:700;"><a href="/security-awareness-training" title="7) Security Awareness Training:" target="_blank" rel="">7) Security Awareness Training:</a></span> Knowledge is power, so many experts believe that educating employees is often the best line of defence. By providing staff with the training they need to spot common hacking tactics, such as phishing emails, you will be creating a culture of security and confidence. Threats evolve rapidly, so it’s important to keep training up to date and relevant, and it’s a good idea to conduct regular phishing simulations to keep people on the ball.&nbsp;</div></div><br><div><div><span style="font-weight:700;"><a href="/password-manager" title="8) Robust Password Policies:" target="_blank" rel="">8) Robust Password Policies:</a></span>&nbsp;<span style="color:inherit;">A recent study from NordPass revealed that millions of people still use “qwerty” and “123246” as their passwords, and – even more concerning - over half of IT professionals still use the same password to access different accounts. In fact, as many as 73% of passwords are duplicates, which means if one account is hacked, the chances are your others will be too. By requiring users to change to complex passwords (containing special characters, numbers and inconsistent capitalisation) you’ll be making it much harder for hackers to break in.</span></div></div><br><div><div><span style="font-weight:700;">9) Physical Barriers:</span> Although much of modern business is conducted online, it’s still important to consider what physical security you’re using in your workplace. Security staff, cameras, alarms, key cards and good old-fashioned locks are still as effective as the ever were, and combined with modern biometric tools like thumb and retina scans they go a long way towards preventing crime.</div></div><br><div><div><span style="font-weight:700;"><a href="/dark-web-monitoring" title="10) Dark Web Monitoring:" target="_blank" rel="">10) Dark Web Monitoring:</a></span> The dark web is notoriously a hotbed of illicit, insidious online activities, which includes the sale of business-critical data. Employee data is often targeted, enabling hackers to send malicious emails and install viruses. You can invest in tools that search the dark web for staff email addresses and passwords to keep you one step ahead.</div></div><br><div><div><span style="font-weight:700;"><a href="/backup-disaster-recovery" title="11) Disaster Recovery:" target="_blank" rel="">11) Disaster Recovery:</a></span> With new threats emerging all the time and the security landscape becoming increasingly complex, it’s impossible for anyone to offer 100% certainty against attacks. But what you can do is ensure that if the worst does happen, you’ve got the right business continuity and disaster recovery methods in place. These solutions include performing regular data backups and making sure your business continuity plan is routinely tested, maintained and updated, vastly improving your chances of getting back to business quickly and with minimal disruption.</div></div><br><div><div><span style="font-weight:700;">12) Managed Detection and Response:</span> It’s impossible for one human (or even a whole team of them) to monitor a system 24/7 and detect potential threats. Managed Detection and Response (MDR) is a solution that combines human skill and experience with state-of-the-art software to ensure your network is as safe as possible, all day, every day. Without the right tools data breaches can go unnoticed for over 200 days, which means cyber criminals to wreak havoc while you’re blissfully unaware.&nbsp;</div></div></div></div></div></div>
</div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">If you want to do more to protect your organisation’s data and reputation, <a href="/contact-us" title="contact us" target="_blank" rel="">contact us</a> today to find out more about our <a href="/managed-services" title="Multi-Layered Defence services." target="_blank" rel="">Multi-Layered Defence services.</a>&nbsp;</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Find out now how many of your users take the bait and reply to a <span style="font-weight:700;">spoofed email</span></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><div>Did you know that <span style="font-weight:700;">60% of spoofed email attacks</span> do not include a malicious link or attachment?&nbsp;<span style="color:inherit;">When crafted well, <span style="font-weight:700;">most</span> users are likely to fall victim to a highly targeted social engineering attack.&nbsp;</span></div></div><div><span style="color:inherit;"><br></span></div><div><span style="color:inherit;">Try our Phishing Reply Test (PRT) it is a complimentary IT security tool that makes it easy for you to check to see if key users in your organisation will reply to a highly targeted impersonation attack.</span></div></div><div><span style="color:inherit;"><br></span></div><div><div><span style="color:inherit;">PRT will give you quick insights into how many users will take the bait so you can <span style="font-weight:700;">take action to train your users and better protect your organisation from these fraudulent attacks!</span></span><br></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 279px !important ; height: 237px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:279px ; height:237px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:279px ; height:237px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-reply-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Spoof-1.png" width="279" height="237" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="font-size:18px;">Immediately start your test with your choice of <span style="font-weight:700;">three phishing reply scenarios</span></span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="font-weight:700;">Spoof a Sender's name and email address</span> your users know and trust</span><br></li><li><span style="color:inherit;"><span style="color:inherit;"><span style="font-weight:700;">Phishes for user replies</span> and returns the results to you within minutes<br></span></span></li><li><span style="color:inherit;">Get a <span style="font-weight:700;">PDF emailed to you within 24 hours</span> with the percentage of users that replied</span><br></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-reply-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 16 May 2022 10:11:48 +0000</pubDate></item></channel></rss>