Common Scams

Some of the most common scams you need to be looking out for. Your business is being targeted (all businesses are, all the time). It’s from last year, but still valid. Good antivirus helps as does a spam filter with phishing protection but your people are your biggest risk!

#scams #dontgetcaughtout

 

The top scams you need to know about and advice on how to get help and how to report them.

 

Spot that Scam!

Are you confident that all your staff know how to recognise an internet scam or phishing attack?

If the answer’s no, contact us today for an online safety training session. Call 01245-323900 or email support@lisltd.co.uk.  Don’t be an April Fool and wait until it is too late!

#hackers #training #bettersafethansorry

You are the Weakest Link, Goodbye!

The not-so-hidden truth about cyber crime: Your staff (and not hackers) could be the biggest threat.

It’s not a big surprise to LIS sadly. Business owners acknowledge the problem but don’t take the staff training and testing available from us. We see 3 or 4  clients a year that fall victim to “obvious” human attacks, with losses of £10,000 to £50,000 each time. No technical issues, no malware or other breaches just busy people  trying to be helpful. We capture and report all the technical information but that there is little if any reaction from law enforcement or banks other than a metaphorical shrug of the shoulders. If you think you might be at risk and want a free chat to cover the issue, book a call with an expert.

#cybercrime #phishing #weakestlink

John Andrews, VP, Centrify, explores cyber crime in the UK and the rising tide of privilege access management attacks

 

Data Breach? Now What?

How would you handle a data breach? You now have lots of problems to consider besides the actual breach itself. How do you keep the ICO happy? What about GDPR? How will you tell those affected? Will this impact on your future sales?

Far, far better not to be exposed in the first place.  Contact LIS for a review of your setup and any specific risks and mitigation. Why not create a plan now so you have a process to follow when it all hits the fan? Why not consider improving your processes and security so the risk of a data breach is reduced or eliminated?