The Evolution of phishing: How it is becoming more sophisticated over time

mitigatecyber

The term “phishing” was first used in 1996 to describe a group of hackers impersonating AOL workers on AOL messenger to steal users’ accounts and billing details. As this was a never-seen-before tactic, many naïve users fell for this scam. Even though we’d like to think we’re too tech-savvy to fall for a phishing scam […]

The Evolution of phishing: How it is becoming more sophisticated over time Read More »

The Economic Impacts of Cyber Crime: How it Costs Us All

Cyber crime – also known as “cyber espionage,” “cyber terrorism,” and even “cyber warfare” – is a severe problem that can have numerous, significant impacts on countries worldwide. While America has been the focus of much recent cybercrime activity, with Sony being hacked and millions of citizens’ data leaked from the Office of Personnel Management

The Economic Impacts of Cyber Crime: How it Costs Us All Read More »

Mitigate Cyber Are Excited to Announce That We Are Now Part of The Citation Group

We’re pleased to announce that Mitigate Cyber has been acquired by The Citation Group – a leading provider of compliance and quality services. Established in 1996, with offices based in the UK and Australia, The Citation Group offers a diverse service offering of HR, training, compliance, accreditation, and security solutions. The services offered by The

Mitigate Cyber Are Excited to Announce That We Are Now Part of The Citation Group Read More »

Cyber Security Considerations for Web3.0: How to Protect Your Data in the New Decentralised World

The way the internet is organised is undergoing a considerable transformation. There is a shift in the internet’s architecture from a read/write model to a newer model known as Web3.0. With Web3.0, users and the community take ownership of the internet instead of large and centralised corporations. Growing anti-big tech sentiment and concerns about big

Cyber Security Considerations for Web3.0: How to Protect Your Data in the New Decentralised World Read More »

The Methods Hackers Are Using to Target Russia and Fight Back Following Ukraine Invasion

Russia has been hotly criticised for its brutal and aggressive display of power in Ukraine. The methods hackers use to fight against Russia can be seen through their government’s response to the cyber attacks and leaks. Russia militarily invaded Ukraine in 2014, claiming that they had “to protect Russian-speaking citizens living in the Crimea region

The Methods Hackers Are Using to Target Russia and Fight Back Following Ukraine Invasion Read More »

Russia’s Cyber Warfare: How They’re Doing It, and What It Means for Businesses

mitigatecyber

Businesses all over the world are increasingly worried about cyber attacks. Russia has been particularly aggressive in its cyber warfare, targeting Ukraine in several attacks. It is believed that they were behind the infamous NotPetya attack in 2017, which caused billions of dollars in damage worldwide. They have also been linked to several more minor

Russia’s Cyber Warfare: How They’re Doing It, and What It Means for Businesses Read More »

Security Vulnerability Assessment – Key Concepts for a Solid Security Plan

mitigatecyber

Many organisations are currently in the process of updating their security measures to better protect against cyber threats. One way to do this is through a vulnerability assessment, which is an important step in the organisation’s risk management strategy. If you don’t know about the probability of being infected by one of these vulnerabilities, analysis

Security Vulnerability Assessment – Key Concepts for a Solid Security Plan Read More »

Why Cyber Security Training is Important for Organisations

mitigatecyber

Contrary to the belief of some, cyber attacks are targeted not just at large enterprises and government institutions. The reality is that cyber security threats exist everywhere; at both an organisational and individual level. To help instil a cyber security mindset among employees and minimise the risk of breaches, organisations must implement cyber security training.   What

Why Cyber Security Training is Important for Organisations Read More »

A New Collaboration of Cyber Security Professionals and Experts are Launching the Lancashire Cyber Alliance

Organisations in the Lancashire region have an opportunity to join the Lancashire Cyber Alliance (LCA), which will give membership of the North West Cyber Security Cluster. This new group will offer expert cyber security advice and skills for SMEs, large businesses and other organisations, specifically in cyber security. The LCA are hosting their launch event

A New Collaboration of Cyber Security Professionals and Experts are Launching the Lancashire Cyber Alliance Read More »

Cyber Essentials 2022 Update

On the 24th January 2022, IASME and the National Cyber Security Centre will introduce an updated set of requirements for the Cyber Essentials certification scheme. The update is the biggest overhaul of the scheme’s technical controls since it was launched in 2014. Over the past two years, the adoption of cloud services has massively increased

Cyber Essentials 2022 Update Read More »

Scroll to Top