What is Passwordless Authentication? And Why Should My Business Adopt it ASAP?
Passwordless authentication. Not the snappiest phrase you’ll ever read. But, in the world of IT, it’s growing a rock star status with the likes of Google, Microsoft and Apple all supporting or...
View ArticleYou Need to Shut Down THIS Microsoft Teams Security Flaw Now
What if the bad guys could send malware to your employees from an email that looks like it came from inside your organisation? This is the scenario with the latest Microsoft Teams security flaw. And...
View ArticleUh-Oh – ‘Evil’ Phishing Technique Can Beat Multi-Factor Authentication (MFA)
Heard yesterday: ‘In your face, cyber-criminals – we have multi-factor authentication (MFA) and you are locked out of our systems.’ Heard today: ‘Er, Boss, an unknown individual has signed into our...
View ArticleCharity Cyber Security: the One Simple Thing Non-Profits Must do to Repel...
Charities and non-profits are the good guys, right? Even cyber criminals – with their broken moral compasses – know that and focus their attention on other quarry. You’d think. And you’d think wrong....
View ArticleIntersys Successfully Renews IS0 270001 Certification
Intersys’ laser focus on all things security was once more recognised recently at our ISO 27001 three-year recertification audit. ISO 27001 Information Security Management is an internationally...
View ArticleHow to Write a School Cyber Security Policy
While there is a legal requirement for schools to provide a basic e‑safety and computer usage policy, there is no similar requirement for a cyber security policy. This doesn’t mean you shouldn’t have...
View ArticleWhat is Vishing? And Why are Vishing Scammers the ‘Hollywood Actors of the...
Imagine you’re a busy telephone operator at a mobile company. You get a call from a harassed-sounding woman. You hear a newborn howling in the background. She’s flying later today and desperately...
View ArticleIs That QR Code Malicious? Here’s How to Find Out
Quick Quiz. Which of these things can a QR code do? Open a URL Download an application Add a personal contact Compose an email Connect to Wifi Send and receive payment Share a location Trick question....
View ArticleBrowser Security Warning: The Software You Are Using to Read This Page Could...
In a 2010 episode of South Park, Kyle failed to read a laboriously long end-user agreement before downloading a piece of software and found himself legally obliged to take part in a hideous human...
View ArticleHere’s Why Charities Loved Our Cyber Security Webinar
We recently invited a diverse group of charities to join a webinar on cyber security resilience aimed at the non-profit sector. Non profits occupy a special place on the Intersys client list and over...
View Article
More Pages to Explore .....