Education

Don’t Get Reeled In! Recognising and Reporting Phishing

Have you ever received an email from a foreigner requesting financial assistance? How about a text message claiming you’ve won a particular prize for a competition you’ve never entered? In cybersecurity, these scams are commonly known as “phishing” attempts.   Believed to come from the term “phoney fishing,” the Internet Engineering Task Force defines phishing as a technique for attempting to acquire sensitive data (e.g.

Read More »
Spring Forward into Cyber Hygiene

Spring Forward into Cyber Hygiene

Remember that time changes this Sunday! We move forward one hour. As you take time to update your clocks and declutter your homes this weekend, CIRT-BS reminds you to ensure that your cyber hygiene is being taken care of, too!   Organise Your Files Clean folders make spotting malicious files and viruses easier.   Review Bank Statements Check for unauthorised transactions and query them.  

Read More »
Change your password day.

Build Better Passwords for Online Security this “Change Your Password Day”

What do your bank, social media, and email accounts share? A password! Passwords are one of the most critical lines of defence against cyber attacks. They help ensure our data is only accessed by authorised users, even in the event of device theft or loss. Many people choose passwords found in the dictionary and reuse them across multiple accounts, meaning that once a cybercriminal has

Read More »
CIRT-BS Data Privacy Week | Protect Your Data

Data Privacy Week: 4 Ways to Protect Your Data

So what’s the big deal about privacy, anyway? When you avoid taking measures to take control of your data, you make yourself susceptible to identity theft, which can lead to several issues, including financial loss and damage to your online footprint. Throughout this Data Privacy Week, CIRT-BS covered topics around practising discernment in sharing specific data with various services and taking action on our decisions through

Read More »
Data Privacy Week: Take Control of Your Data and Get Comfortable with Privacy

Data Privacy Week: Get Comfortable with Privacy

We may feel despair about how our data is collected and used by our apps and web services—especially as they often request more data than necessary. But here’s the silver lining, thanks to privacy rules like the GDPR and Data Protection Act: you have some control! Privacy rules help protect us, the users. Websites and apps are now increasing transparency around the info they collect and how

Read More »

Data Privacy Week: The Privacy & Convenience Trade-off

Think about the last application you downloaded on your mobile phone. It could be a messaging tool, an engaging social media platform, or even a GPS navigator. Whatever the app may be, mobile applications add considerable value to our lives… but at what cost? The truth is, while these apps may provide convenience, they also infringe on your privacy by collecting extensive data on you and

Read More »

Introduction to Cybersecurity

Imagine the chaos of a world where your online financial systems are compromised daily, you have difficulty accessing email accounts when you want to, and your local meteorologists cannot detect the next storm before it happens. This is a glimpse into the reality of a world without cybersecurity. CISA, the United States’ Cybersecurity & Infrastructure Security Agency, defines cybersecurity as the art of protecting networks,

Read More »

Understanding Akira Ransomware and Ransomware Trends: A Comprehensive Analysis

Author: Marcus Knowles Jr. CIRT Analyst In the rapidly evolving landscape of cybersecurity, ransomware attacks have emerged as one of the most pervasive and damaging threats to businesses worldwide. Among the myriad ransomware families, one name has been making headlines – Akira. Understanding the origins, evolution, and tactics employed by Akira is crucial in the fight against this potent digital adversary. Ransomware families reported in

Read More »
Holiday Shopping Awareness Guide

Cyber Steward’s Guide to Online Christmas Shopping

Cyber Steward’s Guide to Online Christmas Shopping Spot the Real Deals Learn the difference between genuine offers and too-good-to-be-true scams. Secure Your Transactions Use trusted payment methods and ensure the website’s security before entering your details. Keep Software Updated Running the latest security software is your first defence against cyber threats. Watch Out for Fake Reviews Rely on verified purchase reviews and be wary of

Read More »
World Backup Day advisory on following the 3-2-1 Backup rule.

World Backup Day

Did you know that 31 March has been dubbed the day to backup and better protect your data? Losing important digital files happen way more

Read More »
Tips for avoiding scams around Valentine's Day

Happy Valentine’s Day

Online dating is becoming increasingly popular in our communities and while many may be searching for their Valentine via dating apps and social media platforms,

Read More »
Scroll to Top
Skip to content