Beware of Cyber Hackers this Christmas

Beware of Cyber Hackers this Christmas

As you probably already know, December is one of the biggest shopping months of the year! Around this time, there is often a rise in cyber attacks targeting Christmas shoppers online. We’re going to look at the different things you should look out for to avoid getting...
Business Email Compromise: The Ins and Outs

Business Email Compromise: The Ins and Outs

According to AIG  – one of the world’s leading global insurance organisations – ‘business email compromise’ (BEC) has overtaken data breaches and ransomware as the main trigger of AIG cyber claims in Europe, the Middle East and Africa. In 2018, BEC...
The History of Digital Authentication

The History of Digital Authentication

What is Digital Authentication? Digital authentication refers to the process by which a user’s identity is established and presented electronically. This is usually in order to gain access to an information system. Digital authentication is ingrained in our everyday...
Is My Phone Listening to Me?

Is My Phone Listening to Me?

Recently, mobile security company Wandera announced it had carried out research to address the conspiracy theory that tech giants are listening to our conversations.  This involved putting two phones – a Samsung Android and an Apple iPhone – into an “audio...
How to Delete Old Online Accounts

How to Delete Old Online Accounts

Old internet accounts that you’ve forgotten about and don’t use anymore could be putting your personal information at risk. We’re going to look at how this could happen, and show you how you can delete these so-called ‘zombie’ accounts. The Risks Think about all of...