Pretexting: The thinking hacker’s phishing
In social engineering, phishing campaigns often involve spending out bulk emails to countless addresses with fake premises and links, in the hope that one employee
In social engineering, phishing campaigns often involve spending out bulk emails to countless addresses with fake premises and links, in the hope that one employee
Threats have evolved. Get ahead of the risk with Tenable One – anticipate likely attacks and proactively reduce your cyber risk. Your attack surface is
The International Organisation for Standardisation periodically updates ISO 27001 and related standards to keep pace with technological developments. The latest versions of ISO 27001 and
We know getting Cyber Essentials certified can be a complicated process. At OmniCyber Security, we provide you with support throughout your assessment, and to that
Businesses that store card information for customers making future payments are ripe targets for hackers. Phishing schemes targeting individuals produce the odd return but targeting
Linkedin Author: Stephen Fowler, Director of Technologies Stephen writes about the current increased cybersecurity risk to your business. If you would like to talk about
The Payment Card Industry Data Security Standard was introduced to promote card data security globally and provide a standard that all businesses that hold cardholder
Linkedin Author: Stephen Fowler, Director of Technologies Stephen writes about this year’s Cybersecurity Awareness Month. If you would like to talk about your own cyber
In its most basic form, hacking involves a malicious actor trying to guess a password to gain access to your account. There are more sophisticated
Apple released its iOS 16 update last week, offering users plenty of lock-screen customisation and the ability to unsend messages and emails. However, the most
Our Cyber Essentials checklist is the perfect tool to make sure you and your organisation are well-prepared for the CE assessment.
Hackers have used the opportunity offered by NASA’s new James Webb telescope to try and spread some malware
Read about our penetration testers when they went to Def Con, the world’s biggest hacking convention, for the first time in August
In the evolving world of cyber-security, supply-chain attacks are a proven threat that need to be examined.
It is vital to choose a cybersecurity company that is accredited to an internationally recognised organisation with the proper credentials, to attain adequate protection and