In the first half of 2020, law firms reported to the SRA that nearly £2.5m of money held had been stolen by cybercriminals.
Category: cybersecurity
MTD or MDM – Which Do You Need?
If you’ve already got MDM, can you justify also having MTD?
Beware text message scams
In April, Android users were attacked by a new viral threat that swept the UK and infected phones by the thousand. Called FluBot, it spread by sending phishing messages via SMS texts.
It’s a problem in the industry that infuriates me – large cybersecurity companies apply the same threat model to all platforms.
For those who want to dig a little deeper into their organisation’s mobile threats, Traced CTO Matt Boddy demonstrates hunting for the Cerberus banking Trojan, using Traced Control.
FlixOnline offered two months’ free Netflix access for free, but it was fake app harbouring malware that takes control of the victim’s Android phone.
This infographic breaks down mobile security for businesses and explains how and why it is a key player in GDPR compliance.
Financial Services
Your phones a hot target for phishing attacks and data theft, and the front line in guarding against FCA and GDPR violations.
The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals.
It takes a thief to catch a thief, they say. So what can a thief teach us about BEC (Business Email Compromise), one of the most difficult to combat forms of computer theft?