Get in touch

Get in touch

  • This field is for validation purposes and should be left unchanged.

Privacy Notice

X

When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.

Reveal Menu

We’ve received warning from Cyber Protection Officers that cyber criminals are using the Coronavirus as bait to send phishing emails to access personal details or company data. Security professionals have found malicious PDF, MP4 and docx files disguised as documents in emails. The campaign is spreading and reaching many countries now including the UK, and is customised in different languages. Attackers are always coming up with new methods to trick people into clicking on malicious links and using high-profile topics that are emotion driven is common amongst scammers.

A hand coming out of a computer stealing money and credit card

What is phishing?

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy and well-known entity. Email and SMS messaging is the most common platform for phishing, and often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site or open malicious attachments to add malware to their computers.

Four tips for remaining cyber safe:

  • Install antivirus software and keep it updated
  • Check incoming email domains and always type web addresses directly into google, don’t click a link
  • Keep software up-to-date on all devices: PCs, mobiles and tablets
  • Always use strong complex passwords and add two-factor authentication to all accounts where possible for an extra layer of security

Be Vigilant

It is important to remain vigilant when receiving emails, texts and even phone calls from seemingly reputable companies. Don’t click on a link or give out any information unless you are 100% sure it is safe. Ken Holmes, CertiKit’s Principal Consultant said, “The willingness of fraudsters to make use of major crises to gain a foothold into computers and networks to steal personal data proves once more how strong cyber security is vital to individuals and businesses.”

We’ve helped more than 4000 businesses with their compliance

Testimonials

The toolkits are very clear and easy to use and probably the best examples out there for these standards. Easy to adapt or add details to, to reflect your own processes and procedures.

Aberdein Considine
UK

View all Testimonials