You’ve been hijacked!

You’ve been hijacked!

Has it ever happened to you that you opened the web browser on your PC and it looked a bit off? Then you perhaps did a Google search for something or tried to access your email only to have a dozen ads popping up or to be redirected to some other URL. Well, it means your web browser was hijacked. Browser hijacking is one of the most common cyber crimes out there today.

What is browser hijacking?

Browser hijacking is when a malware enters your system and takes control of your browser. It then makes […]

Your employee quit your organization Make sure your data hasn’t

Your employee quit your organization. Make sure your data hasn’t

When someone new joins your organization, how do you manage their onboarding? Chances are, you already have processes in place for everything. The employee paperwork is taken care of by the HR, the on-floor assistance and other training is probably provided by a senior team member or the training and development team, and your IT team or MSP handles their IT/computer setup. But, what happens when they are leaving the organization. Is your off-boarding process just as meticulous?

Businesses pay a lot of attention to data safety and security […]

VPN 101: Remote access and safety

VPN 101: Remote access and safety

As we know, the Coronavirus pandemic has brought about a paradigm shift in the way businesses function. Home is now, ‘The Office’. With WFH taking root, companies and employees alike are experiencing so many benefits that it looks like it is here to stay. This has given a boost to various technologies that enable businesses to operate smoothly in the WFH environment. Examples include video conferencing applications such as Zoom, Microsoft Teams, Google Meet, Cloud data storage options, VoIP, etc., In this blog, we discuss one such technology, Virtual Private Networks, more […]

System and software updates: Why you shouldn’t be skipping them for later

System & software updates: Why you shouldn’t be skipping them for later

We all know how annoying it can be when you get a pop-up asking if you’d like to update it or worse still, your system starts to update itself. The general tendency is to put it off until the next time you log onto your device, when you put it off again. We have all experienced it at some point or another, when we are on that important call or have to reply to an urgent email and decide a system update is just not worth […]

A “Free” Covid Vaccine can give you a virus (and infect your IT network)

A “Free” Covid Vaccine can give you a virus (and infect your IT network)

With the pandemic still raging in most parts of the world, cybercriminals have come up with yet another novel technique to lure unsuspecting victims and steal their data–the free Covid-19Vaccine scam. This is how it typically works.

You get an email or a text message that says you are eligible to receive the vaccine for Covid-19 free of cost. The message will have a link which will take you to a form, where you may be asked for your personal information. Once you fill […]

Cyber Security training basics: Password best practices

Cyber Security training basics: Password best practices & phishing identification

As a business you know the importance of ensuring that your data is safe from the prying eyes of cyber criminals. While anti malware software programs and firewalls are essential to doing this, another important element is, training your employees to identify the traps laid by cyber criminals. This blog offers a list of what you should cover in cybersecurity awareness training.

Password best practices

This should be number one on your list. The easiest way to steal your data is by stealing your password. Hence you should educate […]

What does cyber insurance typically cover?

What does cyber insurance typically cover?

Pandemic or no pandemic–cyber insurance is a must-have. And, not just that, some of your clients may insist that you have cyber insurance coverage before they trust you with their data–especially if you are operating in the B2B market. Cyber insurance can break the fall in case you become the victim of a cyber attack or some gross malfunction that causes data loss. Here’s a list of things cyber insurance policies typically cover.

Forensic analysis

After a cybersecurity attack, you need to conduct a root cause analysis to identify what went wrong and where, […]

Why does your business need cyber insurance?

Why does your business need cyber insurance?

The WFH model makes businesses much more vulnerable and easy targets for cybercriminals. Some of the reasons include

  • A lot of people accessing their work data from home networks, which lacks high-level security
  • The inability of businesses to monitor the work-related IT activities of their staff and,
  • The use of personal devices by employees for work purposes

Businesses can overcome this challenge through a combination of tools and actions such as

  • Installing anti-malware software
  • Putting in firewalls to safeguard their work network
  • Having clear and effective IT policies in place when operations are remote
  • Providing […]

WFH means more vulnerability to cybercrime

WFH means more vulnerability to cybercrime. Here are some methods to stay safe

WFH opens up whole new horizons in terms of flexibility, productivity, and cost savings. But, it also opens your business up a little more to cybercriminals, as you can’t have a hands-on approach to cybersecurity, especially if your employees are using their own devices for work. This blog discusses some mechanisms that you can use to mitigate the risks of becoming a victim of cybercrime in the WFH setup.

Multi-factor authentication

Instead of using a single password for data access, multi-factor authentication adds more layers to security. […]

Data security in a WFH setup

Data security in a WFH setup

Do you have staff working from home? With the pandemic still around, the answer to that question is most likely a “Yes”. And, that makes sense too, why risk the safety of your staff when you can operate equally well or even better with them working from the safety of their homes. But, did you know that the WFH model can put your data at risk? When you have your employees work remotely, inadvertently your data is more vulnerable to cybercrimes. However, there are solutions that help ensure the WFH environment is […]