3 Cyber Security Horror Stories

3 Cyber Security Horror Stories

It’s that time of year again, some people at home are carving pumpkins and others will be sitting down to binge their favourite horror films. Some of our personal film favourites include Friday the 13th, Nightmare on Elm Street and Shaun of the Dead, but one thing that makes us want to hide under the covers is the headlines about …

What happened in the Facebook security breach?

On Friday it was announced that Facebook was hit by a cyber breach that attacked up to 50 million user accounts. The company indicated that criminals exploited a vulnerable feature due to a software bug which enabled the hackers to act like users on their profile; also referred to as the ‘View As’ option,  a privacy feature enabling users to …

Why Cyber Security is Important for Small Businesses

Today it’s commonplace to see in the news that organisations like Dixons Carphone, Adidas and the NHS are the victims of large-scale cyber attacks. But, it’s relatively little known that small businesses are also at the same risk of falling victim of cyber attacks. With Verizon reporting that 58% of malware victims are categorised as small businesses, it could be …

The Bob’s Business Guide to Using Public Wi-Fi Safely

Have you ever found yourself visiting a client for a coffee and felt the need to connect to public Wi-Fi? If you are working from home or on the go, make sure to consider how you connect to the internet and the networks available. A router is often what connects your laptop and devices through public networks, while you may …

The Bob’s Business Guide to the Perfect Password

Passwords are like pants. You shouldn’t leave them out where people can see them and you shouldn’t hand them out to strangers! Your password is often the only thing blocking a whole tidal wave of mischief and headaches (both for you personally, and the company you work for), so it might be a shock for you to learn that guessing …

What is Fileless Malware?

We have always been told that the most effective way to protect ourselves online is to install some form of antivirus software, but this does not always track the data that’s leaving your organisation’s network and devices. Although it is nothing new, fileless malware is extremely powerful and can have many detrimental effects if you fall victim to it. Not …

What is a Keylogger?

What is a Keylogger?

Malware today exists in many forms. It can lock down your computer, download all of your files and even steal your identity. Once your machine has been infected with Keylogger malware, what can criminals actually do with it? They can use your machine to harvest passwords, send phishing emails, mine cryptocurrencies and much more. Keyloggers are the go-to method for …

What is Malvertising?

Here at Bob’s Business, we have noticed an increase in the amount of Malvertising cyber attacks as of late. Unfortunately, it is not common knowledge what malvertising is or how it can negatively affect organisations or individuals who fall into the trap. Below are some key pieces of information that will help give you a better understanding of malvertising. How …

Social Engineering

What is Social Engineering?

We often hear the question here at Bob’s: What is Social Engineering? It is not always clear how social engineering works or how it can put you or your organisation at risk. Social Engineering is the human equivalent of hacking a computer. Social engineers are often smart individuals who understand how to manipulate people and talk their way in and …