As the use of Macs increases for both business and personal use, so does the malicious activity directed against them.
Safeguard your password and other login details to prevent unauthorised access to banking.
You may not even know you're part of a botnet
Take a systematic approach to security. Start with an effective business security plan.
Always query irregular payment requests, even from a senior colleague.
Having cyber certification can bring a number of important benefits to any organisation.
Have access to a cyber and information security support specialist.
You may need insurance to cover lost data, viruses, hacking and data breaches.
You should have a process for managing and reporting security breaches.
Confidential data and communications should be encrypted to render it useless if it falls into the wrong hands.
Online attacks which render your website unable to service legitimate requests.
Dispose of computers and mobile devices correctly to avoid information being accessed - even if you thought it was deleted.
Ensure that when you download anything from the internet, you are doing so legally.
Ensure good cyber and information security practice and robust systems are in place.
Taking and making card payments involves risk, but simple precautions can prevent problems.
A firewall is a barrier between the internet and your computers or network – preventing unauthorised visits to or egress from your systems.
Be aware of the risks in your organisation, and how to identify and prevent fraud.
Hacking of a website or social networking page to cause disruption or make a point on political, social or ethical grounds.
Protect access from unwanted attention by ensuring it is secure at all times.
Software designed to gain unauthorised access to computers and other connected devices, for a number of illicit reasons.
Don't be duped into changing details for regular payments your business makes
Use & protection of strong passwords is vital in order to protect security and identity.
It is vital to protect your website against attacks from hackers, as well as technical failure.
Bogus emails are the most commonplace way for fraudsters to infiltrate your business.
A form of malware that enables criminals to lock your files to hold the business to ransom.
Take a number of sensible precautions when selling on eBay
Social engineering is the route to many types of crime including fraud and identity theft - involving manipulation or deceit.
Not observing good practice or having robust systems in place could jeopardise the security of organisations up and down the supply chain.
emails claiming to be from the tax authorities are widespread and convincing.
Keep it closed and confidential.
Social media as a business tool and employees' use of social media.
The very important difference between company and consumer VPNs
Convenience and efficiency is balanced by a degree of risk, which must be minimised with staff policies.
This page deals with the safe setting up and use of office and home Wi-Fi networks.
Microsoft ceased support for Windows Server 2003 & Small Business Server 2003 operating systems in 2015.
Microsoft ceased support for XP in 2014 meaning no updates, patches, fixes or Microsoft Security Essentials.
We value your opinion - help us improve our service by filling out a quick survey.No thanks