The Cyber Source blog

Cyber Security, in plain English

Real life cyber crime Video - #4 Phishing attack affects healthcare provider

Real-life-cyber-stories-ransomware-heist

#4 "Big Phish"

Phishing attack affects major healthcare supplier.

Cyber criminals continue to find new and more effective ways to take advantage of every organisation’s biggest security weakness – its people – to gain access.  And once they are in, they can do all the things that your employees can do – and more. [Continue Reading»]

Discover what happened to this healthcare supplier when an employee unknowingly clicked on a phishing email.

Story 4 - BIG PHISH_Comtact-Final - SUBTITLED

WATCH ANOTHER STORY

91% of cyber attacks start with a phishing email.  While some attacks are in and out, others can go on undetected for months, all the while siphoning off data or spying on information.  By the time they are detected and booted out, the damage is done.

#Getcybersecure - Take the first step towards cyber improvement

Even for the IT-savvy, navigating the mass of security information and technology solutions can be a daunting task, but becoming cyber secure doesn't need to be as challenging as it may appear.  It starts by identifying and prioritising your risks to so that you can build a solid foundation for improvement.

Get our best tips and expertise in The CIO's Guide to Cyber Security  Improvement »

As one of the UK's foremost cyber security specialists, we've jam-packed our best practice advice , insightful tips and experience into 30-pages of step-by-steps guidance to help you identify your current risk exposure, protect your critical assets and build a board-level security strategy.

#getcybersecure and measurably improve your cyber security - whether you're an IT leader responsible for 50, 5,000 or 50,000 users.

CIO-Expert-Step-by-Step-Guide-to-Cyber-Security-Improvement


Related Articles:

 


About Comtact Ltd.

Comtact Ltd. is a government-approved Cyber Security and IT Managed Service Provider, supporting clients 24/7 from our ISO27001-accredited UK Security Operations Centre (SOC).

Located at the heart of a high security, controlled-access Tier 3 data centre, Comtact's state-of-the-art UK Cyber Defence Centre (SOC) targets, hunts & disrupts hacker behaviour, as part of a multi-layered security defence, to help secure some of the UK's leading organisations.

Explore our 24/7 Security Operations Centre (SOC)

SHARE THIS STORY | |

Sign-up for weekly updates

Recent Posts

Recent Posts