<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=215109733140438&amp;ev=PageView&amp;noscript=1">
header image_main (2)

Cyber Safe Crest




Globally, there continues to be a rising tide of cyber-attacks, which target businesses of all sizes, with the aim of stealing personal/sensitive business data, causing business disruption, defrauding the business or even holding the business to ransomware. The first step towards safe-guarding your business is to ensure that you are aware of the risks and the consequences – this will guide the measures you put in place to safeguard your business.





If you have been the victim of a ransomware attack or demand, you should always report it to the RCIPS, as it’s a criminal offence.

Report to RCIPS Tel: 911




Fake, spam and suspicious emails are commonly referred to as Phishing email as the sender is trying to ‘hook and reel-in’ you in. Phishing emails are sent to persuade and deceive you into compromising your personal data or your organisation’s security by asking you to reveal passwords, company information, financial information, transfer funds, to visit fake websites, to click on malicious links, to open malicious files and the like.


What you should know?

It used to be so easy to spot a suspicious or spam email, as it would contain spelling mistakes, be written in poor English, not be personally addressed to you, etc.

Suspicious and spam emails have become much more sophisticated and at first (and even second) glance, they may look genuine, as they will include logos, brand names, and slogans of legitimate companies.

Cyber attackers often create emails with attachments containing PDF files, word documents, excel spreadsheet and with embedded links containing malicious and harmful software. Opening the attachment or clicking on the embedded link, will likely result in malicious software being executed to run on your computers. From there on, the cyber attacker will be able to gain control of your computer and can spread the malicious software to other computers on our network.


What you should do?

Simple tips you can use to spot phishing emails include:

  • Hovering your cursor over the link, checking the sender's email address carefully;
  • Looking out for emails which purport to have a sense of urgency or include threats, these are designed pressure you into acting quickly without checking, so that you do not realise it is a scam;
  • Always be suspicious of unexpected emails or those from an unknown sender;
  • Ask you to change your account information because there is a discrepancy with your account or you need to verify your account. This tactic is used to scare the end user into clicking on a bad link or going to a bad site and filling in their account information.
  • Tell you your account has been hacked. This is to get a similar response as the one above. You are less likely to think an email that announces you have been hacked is a phishing email.
  • Ask for a wire transfer or the details of a failed wire transfer for a compelling reason. The email usually claims the “transfer details” are in the attachment, which is likely to be malware! The scammer knows that you will likely be suspicious as you had not made a wire transfer, but they are hoping that your curiosity will make you open the attachment to check.
  • Ask you to send you money as a donation, or to redeem a prize. They will either ask you to: give your personal information to send you money, open the attachment to receive the invoice, or click a link to claim your prize. Once you have opened the attachment, it is likely that malware will be downloaded onto your computer.

If you are suspicious of an email or the email is from an unknown or unexpected sender, you should never open the attachments or click on the embedded links. You should move any fake or suspicious emails to your ‘Spam’ or ‘Junk’ folder and report it to your IT Department.

A good practice, is for the IT Department to send a notification to colleagues to advise them, so that they do not fall for the bait, if it transpires that the email was in fact a fake or suspicious email.

If you accidently click on an attachment or embedded link, you should immediately turn off your computer and contact your IT Department or IT Services provider, so that they can run a health-check on your PC and take other appropriate actions.



DON't Let CYBer Criminals Hold You To Ransom


Small Business Guidance

‘Ransomware’ is a particularly disruptive type of malware and is commonly delivered through phishing emails with malicious attachments or malicious embedded links. The victim’s file and or data will be encrypted by the cyber attacker. The result of which, is that the files, data and system that rely on them will be totally unavailable. The cyber attacker will then demand a ransom payment, normally in cryptocurrency, from the victim with the promise of restoring access to their files and data. Remember, that there is no guarantee that the victim’s access to their files and or data will be restored, even after paying the ransom.


What you should know?

Ransomware attacks are fast becoming the most common and lucrative attack methods for cybercriminal. The cyber attackers will target individuals and private sector businesses of any size. We know from media reporting, that all types of business have been targeted and have fallen victim to ransomware attacks.

Awareness of the risks and the potentially damaging impact of ransomware cyber-attacks is key for an organization when deciding on the appropriate measures to put in place to defend against and mitigate the consequences if unfortunately, they do fall victim to a ransomware attack.

You should ensure that you have in place a tried and tested regime of regular backups. Cyber attackers commonly target backups kept online, so you should ensure that you also have backups which are kept offline.

Phishing emails are a common method used by cyber attackers as an entry point for their ransomware attacks. You should provide regular cyber security awareness training to your personnel who have access to your digital resources, so that they don’t fall victim to phishing attacks.

You should ensure that your security software and operating system are up-to-date.

You should implement robust security products to protect your system from all threats, including ransomware threats.

Finally, you should never pay the ransom to cyber attackers, as this will serve to embolden them and may even open you up for further attacks and further ransom demands. You may lose twice if you pay; you may never see your files or data again and it is unlikely you will to get your money back. It is better to have a tried and tested means of recovery in place.

What you should do?

If you have been the victim of a ransomware attack or demand, you should always report it to the RCIPS, as it’s a criminal offence.

Report to RCIPS Tel: 911



You DON't need to lift weights to have strong passwords

Passwords are still a most common way to secure our online accounts and our organisation’s computer systems and data. If the cyber attacker is able to compromise your organisation’s password, they will have access to your systems and data, so it is important that your passwords are not easy to compromise.


What you should know?

‘Weak’ password is the term used to describe passwords that are short in the length, contain commonly used words, or easy to guess or figure-out. Examples of ‘Weak’ passwords are 1234, 123456, password123, passw0rd, abc123, qwerty, the name of your pet, the name of your school or the like.

For convenience, people generally are in the poor habit of reusing the same password across multiple online personal accounts and their work-place systems. This poor practice, provides the cyber attacker with a ‘helping hand’, if say one of your online passwords is compromised (i.e. because known), the cyber attacker, will always try the already compromised password as part of their way into your other online accounts and work-place systems. The cyber attackers also have tools, such as specialised software programs to automate the task of ‘cracking passwords’.

‘Strong passwords’ are more difficult for cyber attackers to compromise, even with the use of automated tools and software. Typically, a strong password is between 10 and 15 keyboard characters in length, remember, the golden rule, that the longer the password, the more difficult, it will be for the cyber attacker to compromise.

The trouble with ‘strong’ passwords is remembering them, so that you don’t have to write it down. A tip is to think about three words that are meaningful and memorable to you and then include one or two numbers in between that are memorable to you.


What you should do?

As part of a regularised programme of staff awareness, staff should be advised that they should never reuse passwords across multiple online accounts and work-place systems. The staff awareness should also include, staff being advised to immediately change their password, if it is suspected that their password has been compromised.

If the work-place systems can enforce a regular change of passwords or a minimum password length, then these features should be enabled by the IT Department or other relevant person.

Where Two-Factor Authentication (2FA) is available, this should always be enabled on online accounts and work-place systems.

The organization should consider implementing appropriate security systems or enable features in existing systems, to monitor and detect any suspicious login attempts and take appropriate action.



Be careful where you surf

Cyber attackers have an abundance of tools readily available at their fingertips to create fake and malicious websites. These websites are created for exploiting and compromising the unsuspecting ‘surfer’, by stealing their personal and sensitive data as well as payment card information.


What you should know?

These fake and malicious websites are designed to look like legitimate online business websites and they may be offering to sell business-related goods at a cheaper price than the legitimate online sites or they may have been created to lure unsuspected persons in believing that they are paying their online utility bills.

The cyber attacker may use the fake or malicious website in combination with other well-known compromise techniques, such as sending a phishing email to employees of the targeted organization or sending utility bill payment reminders. Typically, the text of the email, will be worded with a sense of urgency, for example, it may say that the business has outstanding invoice payment past due, click the link to pay your bill online to avoid service interruption. The link contained within the email, once clicked with take the person to the fake website, which has been created to look identical to the legitimate website.


What you should do?

You should only use trusted and secure websites for your online transactions. One of the signs that a website is insecure is that it will start with http://, whereas secure website will be https:// The https means that your data will be secured with encryption when data is transferred over the internet.

Secure websites, normally have a small padlock next to the web address, or the address may be highlighted in green. If these signs are not presence, it may be a sign that the website is not legitimate.

You should carefully check the domain name of the website. A common tactic of scammers is to create websites with addresses that are very similar in name or similar sounding to legitimate brands, companies or well-known online sites. You should hover your cursor over the address and domain name, to check that the website address makes sense for your online shopping or online transaction.

You should watch out for poor spelling, punctuation and grammar as this could indicate that a website is not legitimate.

You should not use websites that are insecure or require you to make unsecured methods of payment.

You should always do you research before making online purchases.

You should never click on links to access websites from within emails that arouse your suspicion or are from an unknown person or that are unexpected.