Megan Pressler

Cyber Trends to Look Out For in 2023

Cyber attacks and online fraud are only getting more sophisticated through the years, and the average cyber consumer is more vulnerable than ever. Even the most careful individuals can inadvertently download and install malicious software onto their devices or unknowingly give up their vital credentials. One of the most important things you can do to […]

Cyber Trends to Look Out For in 2023 Read More »

Where AI Currently is in 2022

In 2022, artificial intelligence has played an ever-increasing role in the everyday lives of people around the world. AI is increasingly being used in high-risk jobs and decision-making. The combined impacts of AI deep learning algorithms and rapid development in big data mining have enabled the creation of systems with capabilities that were unheard of

Where AI Currently is in 2022 Read More »

Ramifications of Fake Verified Accounts And Increasing Cyber security Risk

Increasing concern around the use of fake or stolen login credentials and their impact on personal and professional identity has been a growing concern for cyber security. Cyber criminals often create malicious trolls, creating fake profiles (or taking over verified accounts) to conduct scams, frauds, and other dishonest schemes. Twitter verified accounts, or blue verified

Ramifications of Fake Verified Accounts And Increasing Cyber security Risk Read More »

Security Laws implemented to increase UK’s Cyber Resilience

The Network and Information Systems (NIS) Regulations have confirmed there will be a strengthening of laws to protect everyday essential services from cyber related incidents. In 2018, the NIS came into force to improve the security of those providing essential national services, such as water, energy, and transport.  As a result of high-profile attacks over

Security Laws implemented to increase UK’s Cyber Resilience Read More »

How To Optimise Your Cyber Awareness Training

The Back Story Before the working-from-home era, most of cyber security activities were restricted within the perimeter of the office environment. Everyone was connected to the protected corporate network and all incoming and outgoing traffic was strictly monitored. Cyber security training was mostly classroom based; employees sat within the board room and spent 2-5 hours

How To Optimise Your Cyber Awareness Training Read More »

The Rise of Education-Targeted Ransomware Attacks

After a decline, ransomware attacks seem to be making a comeback. This statistic cuts across all sectors even though it is subject to variations, but one sector has seen one of the biggest surges is the education sector. Ransomware is a type of malware that can prevent education providers, employees, and pupils from accessing systems and

The Rise of Education-Targeted Ransomware Attacks Read More »

Rise of Automotive Hacking

The rise of automotive hacking is in full force, with many advanced vehicles discovering wireless and other cyber vulnerabilities. This area is becoming a new frontier for car hackers to exploit and learn from. Automotive hacking has been difficult over the past decades because the cars were designed to be protected from the outside by

Rise of Automotive Hacking Read More »

The Evolution of phishing: How it is becoming more sophisticated over time

mitigatecyber

The term “phishing” was first used in 1996 to describe a group of hackers impersonating AOL workers on AOL messenger to steal users’ accounts and billing details. As this was a never-seen-before tactic, many naïve users fell for this scam. Even though we’d like to think we’re too tech-savvy to fall for a phishing scam

The Evolution of phishing: How it is becoming more sophisticated over time Read More »

The Economic Impacts of Cyber Crime: How it Costs Us All

Cyber crime – also known as “cyber espionage,” “cyber terrorism,” and even “cyber warfare” – is a severe problem that can have numerous, significant impacts on countries worldwide. While America has been the focus of much recent cybercrime activity, with Sony being hacked and millions of citizens’ data leaked from the Office of Personnel Management

The Economic Impacts of Cyber Crime: How it Costs Us All Read More »

Mitigate Cyber Are Excited to Announce That We Are Now Part of The Citation Group

We’re pleased to announce that Mitigate Cyber has been acquired by The Citation Group – a leading provider of compliance and quality services. Established in 1996, with offices based in the UK and Australia, The Citation Group offers a diverse service offering of HR, training, compliance, accreditation, and security solutions. The services offered by The

Mitigate Cyber Are Excited to Announce That We Are Now Part of The Citation Group Read More »

Cyber Security Considerations for Web3.0: How to Protect Your Data in the New Decentralised World

The way the internet is organised is undergoing a considerable transformation. There is a shift in the internet’s architecture from a read/write model to a newer model known as Web3.0. With Web3.0, users and the community take ownership of the internet instead of large and centralised corporations. Growing anti-big tech sentiment and concerns about big

Cyber Security Considerations for Web3.0: How to Protect Your Data in the New Decentralised World Read More »

Scroll to Top