Posted in Cyber Security
What is AI and how is it being used by scammers?
Posted by Deb Cashion
on 11 May 2023
What is AI?
AI stands for Artificial Intelligence. AI simulates human thoughts, speech, text and vision in some cases. AI uses algorithms – which is a list of instructions - to solve problems of perform tasks.
AI is being used by cyber scammers in a variety of ways, which makes it difficult for individuals and organisations to detect and prevent cyber crime. Below are some ways AI is being used to hack and scam.
How is AI used to scam or hack?
Social Engineering: AI-powered chatbots...
Posted in:SecurityCyber Security |
Cyber Insurance...is it for you?
Posted by Deb Cashion
on 4 May 2023
You may have heard about cyber insurance but may not fully understand what it is or if your business needs it. With the increasing number of cyber-attacks on businesses and recommended changes in The Privacy Act, it is important to consider investing in cyber insurance. This type of insurance policy is designed to protect businesses from the damage and fallout from cyber-attacks and hacking - such as financial losses, reputational damage, and the loss of sensitive business and customer inform...
Posted in:SecurityMiscCyber Security |
Loyal I.T. Solutions Five Recommended Authenticator Applications or Hardware
Posted by Deb Cashion
on 20 April 2023
Authentication and password security is part of the Essential Eight of Cyber Security and it is strongly advised for your network security. Using an authentication application is also evidence of compliance for insurance policies and investigations.
In the past Loyal I.T. Solutions has strongly urged all their clients to implement two factor (2FA) or multi-factor (MFA) authentication. Our recommendation is to have two forms of authentication – one, a one-time passcode (OTP) via...
Posted in:SecurityCyber SecurityApplications |
MailGuard Email Security
Posted by Deb Cashion
on 4 April 2023
We have recently seen a marked increase in the attempted hacking of email accounts which might include methods such as phishing, spear phishing, spoofing and other forms of Malware (see our Cyber Security Terminology blog for more information on these terms).
Installing a mail protection system that uses policy-based rules to detect threats and enforce compliance, accountability and brand protection is recommended by security experts. Loyal I.T. Solutions uses and recommends Mai...
Posted in:SecurityCyber SecurityEmail |
Microsoft Azure Active Directory Security Defaults
Posted by Deb Cashion
on 27 March 2023
Background
In May 2022, Microsoft announced that it will be automatically enforcing more secure default settings, known as "security defaults" on all existing Microsoft 365 (Azure AD) tenants. Although clients who came on board with the Microsoft portal after October 2019 are already protected, Microsoft is running a campaign to move all users to multi factor authentication (MFA) when logging into the portal. They are currently sending notifications via ...
Posted in:SecurityMiscCyber Security |
Cyber Security Terminology
Posted by Deb Cashion
on 15 March 2023
Cyber security is a concern for all technology users, and hackers and scammers are finding new ways to scam and hack consumers and businesses. Sometimes the terminology can be hard to understand, so this blog is designed to give you the plain English definition of current hacking and scamming terms.
Baiting - A type of social engineering attack where a scammer uses a false promise to lure a victim into a trap which may steal personal and financial information or inflict the system wi...
Posted in:SecurityNetworking SecurityCyber Security |