Home
Articles
Resources
FAQ
Members
About
Report Incident
My
Contact
Search
80 articles, page 2 of 4
 

Poll

Would you consider a cyber security certification for your business?


Yes, it's a potential USP, you can't put a price on that
No, it's not worth the time investment
Yes, provided it was cost proportionate to my size of business
No, they're too expensive
Yes, it demonstrates my commitment to the security of the data I hold
 
 
 

Article overview

 
/ 4
Sort by
Icon representing NFIB Alert re Conveyancing Fraud
NFIB Alert re Conveyancing Fraud

MANDATE FRAUD- CONVEYANCING FRAUD
The National Fraud Intelligence Bureau (NFIB) is continuing to see reports where parties involved in house purchases are targeted to divert funds to bank accounts under the control of fraudsters, resulting in large losses for solicitors or individual purchasers.
Icon representing CEO Fraud Alert
CEO Fraud Alert

Several businesses that have fallen victim to this type of fraud.
Method
A company, often with multiple offices, is targeted by a fraudster who purports to be the CEO of the company and often claims to be based in another country.
Icon representing Identity fraudsters targeting young people
Identity fraudsters targeting young people

But! this message is just as relevant to anyone who uses socia media / networking aplications
Icon representing Recent NFIB Alerts
Recent NFIB Alerts

On behalf of NFIB
Please find attached the following:

Fake Mailboxes- Fraudsters are placing fake letter boxes on residential properties in an attempt to harvest mail.
Icon representing The A-Z of computer and data security threats
The A-Z of computer and data security threats

SOPHOS “Threatsaurus”
Icon representing FSB Cyber Resilience Report 2016
FSB Cyber Resilience Report 2016

How to protect small firms in the digital economy
Icon representing New to the ICO - Information Commissioners Office?
New to the ICO - Information Commissioners Office?

ICO Tool Kit
Icon representing National Cyber Security Centre prospectus
National Cyber Security Centre prospectus

This prospectus explains the vision for the National Cyber Security Centre (NCSC) and how it intends to transform cyber security in the UK.
Icon representing Mobile malware in the UK
Mobile malware in the UK

Paper by the CERT UK dated 1st June 2016
Icon representing CPNI 20 Critical Controls
CPNI 20 Critical Controls

Critical Security Controls guidance
Icon representing Keeping Britain safe from cyber attacks: Matt Hancock speech
Keeping Britain safe from cyber attacks: Matt Hancock speech

25/5/16- The Minister for Cabinet Office gave a speech on the UK's cyber security strategy and keeping Britain safe from cyber attacks.
Icon representing HMG Cyber Breaches Survey 2016
HMG Cyber Breaches Survey 2016

65% of UK Businesses experienced a Cyber Security Breach in the past year. Report released May 2016
Icon representing CPNI - Bimonthly video content
CPNI - Bimonthly video content

Deter, Detect, Delay, Detain
Icon representing CiSP
CiSP

What you need to know
Icon representing Cyber-attacks: would your business get caught out?
Cyber-attacks: would your business get caught out?

Via CERT UK
Executive summary of the attached report.
Cyber-attacks are in the UK are on the rise with no sign of let-up. CERT-UK sees repeating attacks and have created three attack scenarios to demonstrate some of the threats that exist, and steps to defend against them.
Icon representing CPNI advisory video messages
CPNI advisory video messages

Series of short CPNI video messages concerning Physical / Cyber security
Icon representing Fraud alerts
Fraud alerts

1. Fraud Alerts
· Fraudsters Targeting Senior Executives- From the Proactive Intelligence Team (PIT): Fraudsters are targeting residential premises in affluent areas of London to steal post and identify senior executives in companies and organisations.
Icon representing 'To BOYD or Not to BOYD ?'
'To BOYD or Not to BOYD ?'

Spurious link to Shakespeare 400
Icon representing NaCTSO Guidance Note 2A/2015
NaCTSO Guidance Note 2A/2015

Reviewing your Protective Security
Icon representing User guides
User guides

Choosing a mobile device and safe on line shopping