Social Engineering

Security is no picnic blog image

SME Security is No Picnic

Problem in Chair Not in Computer There are many issues that organisations can encounter when dealing with information security; from lost files and credential sharing, to protecting intellectual…


what is phishing in computer blog image

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Fundamentals of Information Security Awareness Assuming you have an email account, which in all likelihood you do, it’s basically guaranteed that at some point you’ve received a phishing email.…


what does phishing mean in computer terms blog image

What Does Phishing Mean in Computer Terms?

A Guide to Phishing and Keeping your Information Protected Dear reader, you must click this link ASAP to apply urgent security updates. Sound familiar? Chances are, if you have an email…


How to Block Phishing Texts image by Hut Six Security

How to Block Phishing Texts

SMS Phishing Fraud Defence Knowing how to block phishing texts and spam emails is essential for personal information security, as both are as seemingly inevitable as the tides. Coming to us…


Information Security Attacks Threaten the UK Education Sector blog image by Hut Six security

Information Security Attacks Threaten the UK Education Sector

How do Information Security Attacks threaten the UK Education Sector? Over the last several years, the education sector in the UK has seen many of the same issues that face industries across the…


malware blog image by Hut Six Security

Malware, Stalkerware – Beware: The Growing Market for Privacy Invading Apps

The threat of malware, spyware and ransomware are all likely familiar to most tech-savvy UK users. With over 78% of UK adults now owning a smartphone, the treasure troves of personal data that these…


sending simulated phishing attacks to employees

Sending Simulated Phishing Attacks to Employees

As phishing attacks become increasingly sophisticated, users are adapting to this cyber threat. Only seven years ago, the user click rate for phishing emails was a whopping 25%, a figure which has…


What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…


How to spot a spear phishing email blog post

Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email

Having covered the rise of spear phishing and how easily criminals can collect information to create targeted attacks, we can now examine the different indicators that can be used to spot a…


spear phishing blog post image

Spear Phishing Series part 1: How a Spear-Phishing Email is Created

Spear-phishing is a much misunderstood topic in the business community. This is the first in a three-part series designed to help you understand how you can reduce your risk of being ‘caught’. These…