Business Email Compromise

What are Business Email Compromise (BEC) Attacks? BEC attacks rely primarily on social engineering. While employees at any level can be targeted, the criminals almost exclusively appeal to seniority to secure compliance. These attackers create email addresses that mimic those used by senior executives, use free services such as Gmail to create email addresses that…

Read More

Do you have the right shredder for the job?

With the return to the office environment now finally underway, are you doing enough to safeguard your sensitive paper documents? It is important to make sure that documents containing personal and commercially sensitive information are securely handled, stored and destroyed at the end of their life. That way organisations protect sensitive, personal and commercial data…

Read More