was successfully added to your cart.

Disaster Recovery

How would your firm handle a phishing attack?

By | Cyber Security, Disaster Recovery, GDPR

The BBC published an article on Tuesday about the aftermath of a successful Phishing attack where the user had granted the malware access by logging into a fake login. The article then details the process inside the company of handling a breach and the procedure they need to follow. However, this team clearly aren’t as prepared as they should be.

At TecSec, we believe in being pro-active which is why we advise you to read our article on “How a Phishing attack progresses” and the red flags to help you identify the phishing email for what it is, a scam.

Under GDPR a phishing attack now must be reported to the ICO as a breach, if the user clicks the link or downloads a file. Depending on the technical and business measures in place, the business is at risk of being fined.

Subscribe for marketing information and updates

By | Cyber Security, Disaster Recovery, GDPR, General, IT Support, Risk Management, Training
Backup Tape Mess

Sign up for free educational guides on a variety of subjects.

We will be releasing a series of guides on a range of topics which may include; disaster recovery, GDPR, Imaging and backup, It security, cyber security and more.

If you are interested in receiving any information then please sign up by clicking the blue button at the top of the page or clicking the link below.

Don’t miss out and sign up today.