by jmvsolutionsltd | Aug 31, 2022 | Cybersecurity
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing...
by jmvsolutionsltd | Aug 25, 2022 | Cybersecurity
How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts...
by jmvsolutionsltd | Aug 24, 2022 | Cybersecurity
In order to achieve Cyber Essentials certification, your IT infrastructure is tested on the following 5 technical controls. Firewalls Secure Configuration User Access Control Malware Protection Patch Management Firewalls The purpose of these devices is to...
by jmvsolutionsltd | Aug 24, 2022 | Cybersecurity
Over 80% of cyber-attacks on UK businesses could have been prevented by implementing some basic security controls. As a result, the UK government introduced the Cyber Essentials Certification scheme in 2014. It is operated by the National Cyber Security Centre (NCSC)....
by jmvsolutionsltd | Aug 20, 2022 | Cybersecurity
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You...
by jmvsolutionsltd | Jul 31, 2022 | Cybersecurity
Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of...