Welcome to the latest issue of Cyber Insights! In this edition, we highlight a current internet search scam, discuss the latest security breaches, and share some tips on protecting your organisation against insider threats. Current Scams Search engines, like Google, are so popular that many people use the search feature instead of typing a URL. For […]
READ MORECyber Insights with Mercury IT- July 2023
Welcome to the latest issue of Cyber Insights! In this edition we unpack the latest phishing scam, discuss the most recent security breaches and share a checklist for email security. Current Scams Recently, cybercriminals have taken advantage of Cybercriminals use images in phishing emails to impersonate real organisations. Cybercriminals hope to trick you into thinking the email is legitimate […]
READ MORECyber Insights with Mercury IT- June 2023
Welcome to the latest issue of Cyber Insights! In this edition we discuss the latest Paypal scam, unpack the most recent security breaches and share some tips on email security. Current Scams Cybercriminals have recently utilised PayPal, the popular international online payment platform. Cybercriminals are impersonating PayPal to steal your personal or financial information. In this scam, cybercriminals […]
READ MORECyber Insights with Mercury IT- May 2023
Current Scams King Charles III was coronated as the new king of the United Kingdom. When a major historical event occurs, people often look to social media and online news sources for information about the event. Cybercriminals use high-profile news stories to catch your attention and manipulate your emotions. In the coming weeks, we expect […]
READ MORE10 Password Best Practices
10 Password Best Practices With the business world heavily reliant on digitalisation in this day and age, the use of technology in your organisation is unavoidable. Although technology can undeniably give your business an advantage in increasingly competitive markets, there are many troublesome areas to keep an eye on. This is why interest in cybersecurity […]
READ MORECyber Insights with Mercury IT- April 2023
Welcome to the latest issue of Cyber Insights! In this edition we discuss the latest scam involving BEC attacks, unpack the most recent security breaches and share some tips about Piggybacking including what it is and what to look out for! Scam Alert Recently, the US FBI has warned about business email compromise (BEC) attacks by cybercriminals […]
READ MORECyber Insights with Mercury IT- March 2023
Welcome to the latest issue of Cyber Insights! In this edition we discuss the latest scam involving ChatGPT, unpack the most recent security breaches and share some tips about Pretexting including what it is and what to look out for! Current Scams ChatGPT, an artificial intelligence (AI) chatbot created by OpenAI, has risen in popularity since its release last […]
READ MORECyber Insights with Mercury IT- February 2023
Welcome to the latest issue of Cyber Insights! In this edition we discuss the latest scam involving DocuSign, unpack the Fire Rescue Victoria security breach and share some tips around Personally Identifiable Information (PII). Scam Alert The scam starts with a fake email that appears to be from DocuSign. The email asks you to review and sign a […]
READ MOREData Minimisation: Why Businesses Should Avoid Retaining Unnecessary Personal Information
Businesses frequently gather and keep a tonne of personally identifiable information (PII) on their clients and customers in the digital era. But keeping superfluous PII on hand can have severe consequences for organisations and people. Data breaches and cyberattacks are more likely, but there is also a chance that personal data will be misused or […]
READ MOREBuilding Habits for a Secure Future
Rather than relying solely on your IT team or the most recent security solutions, your company’s security programme should begin with its employees and strong security policies. Combining a well-drafted cybersecurity policy with comprehensive security awareness training can significantly reduce the likelihood of a data breach. It is your responsibility to provide security training to […]
READ MORE