Part Two: Our guide to cyber attacks and how to tackle them Welcome to part two of our guide to cyber-attacks, where we list the common types to be aware of, alongside real-life examples and advice on tackling them. You can jump to part one here. Man-in-the-Middle (MitM) Once upon a time not so very long ago, people wrote to one another. It was an era of Basildon Bond and billets-doux, before emails and texts. Now imagine … Read More »
Part One: Our guide to cyber attacks and how to tackle them Welcome to part one of our guide to cyber-attacks, where we list the common types to be aware of, alongside real-life examples and advice on tackling them. No. 1 Phishing – Also Known as Social Engineering A while back, I made phishing phone calls (sometimes referred to as vishing) to test the vigilance of a financial services firm’s employees. As a Scottish woman, my colleagues … Read More »
A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Series by Perspective Risk’s (PR’s) Red Teamer Abdul Ikbal, where he advises on network security and share insights in the life of an ethical hacker. In this blog he tells how he – and the bad guys – can access your network and how to improve your security. You can catch up on the series here: How I break into your building, … Read More »
Part 5: 5 phishing tactics threatening UK businesses In our final phishing series post, we look at phishing emails designed with one purpose in mind: identity theft. When we receive an email from Facebook, LinkedIn, Amazon or Apple, our initial reaction is to believe it as we trust the source. Cyber criminals understand the psychology of trust and seek to exploit it through phishing cons. It can take less than 5 minutes to create an authentic-looking phishing email … Read More »
Part 4: 5 phishing tactics threatening UK businesses So far in this series of phishing awareness blogs we’ve looked at CEO Fraud, malicious attachments and malicious links. The previous two posts explored the techniques deployed by cyber criminals to infect recipients’ systems with malicious software. Today’s blog looks at ransomware. Increasingly, cyber criminals are commercialising malware to blackmail their victims. This type of malware is called ransomware. Since the first cases in Russia 10 years ago, ransomware has evolved rapidly, becoming a lucrative practice for cyber criminals across the globe. The attackers send emails with … Read More »
Part 3: 5 phishing tactics threatening UK Businesses Welcome back to our series of blog posts focussing on phishing, a method of social engineering costing UK businesses £ millions every year. In our first post we looked at CEO Fraud. In the second we shared examples of phishing emails with malicious attachments. Staying on the topic of malicious software, this post looks at phishing emails containing a link which, if clicked, installs malware. The tactics used by cyber criminals can be ingenious. For example, there is a rise in watering hole attacks. Hackers … Read More »
Part 2: 5 phishing tactics threatening UK businesses In the first of our series of blog posts we gave an example of CEO Fraud. In this second blog we’re focussing on emails containing malicious attachments. We’ve all experienced arriving home from work to be greeted by a ‘We failed to deliver your parcel’ card on the doormat. The anxiety of losing that precious package typically has us rushing to the parcel depot at the first opportunity. In February this year, email scammers exploited the same emotional drivers in an email to FedEx customers. The email claimed that … Read More »
Part 1: 5 phishing tactics that are threatening UK Businesses As IT departments tighten their network security, cyber criminals are now focusing on the next weak link in business defences – employees. Of the 95,000 phishing email scams reported by Action Fraud in 2015 many were tailored to fool company staff – leading to malware and ransomware infections, as well as data and financial theft. In this series of blog posts we’ll look at five types of … Read More »
We are Perspective Risk
Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.
Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.
Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.