Call us: 0161 726 5020

Careers | Blog | Contact Us

GreystoneGreystone
  • IT Services
    • Managed Support Services
    • Cyber Security Services
    • Modern Workplace and Intune
    • Microsoft 365
    • IT Director as a Service (ITDaaS)
    • Data Backup and Disaster Recovery
    • Network connectivity and Managed Wi-Fi
    • Virtualisation and Servers
  • Software
    • Consultancy
    • Custom Software Development
    • System Integrations
    • Web Development
  • Cloud
    • What is the Cloud
    • Cloud Consultancy
    • Migration Services
    • Security Services
    • Cost Management
    • Automation
    • Monitoring and Reporting
    • Optimisation
    • Auditing
  • Case Studies
  • About
  • Contact

Careers | Blog | Contact Us

GreystoneGreystone
Greystone
  • IT Services
    • Managed Support Services
    • Cyber Security Services
    • Modern Workplace and Intune
    • Microsoft 365
    • IT Director as a Service (ITDaaS)
    • Data Backup and Disaster Recovery
    • Network connectivity and Managed Wi-Fi
    • Virtualisation and Servers
  • Software
    • Consultancy
    • Custom Software Development
    • System Integrations
    • Web Development
  • Cloud
    • What is the Cloud
    • Cloud Consultancy
    • Migration Services
    • Security Services
    • Cost Management
    • Automation
    • Monitoring and Reporting
    • Optimisation
    • Auditing
  • Case Studies
  • About
  • Contact

Stay alert online. Cyber criminals are getting more inventive. Here, we take you through some of the tactics they are using.

12 July 2023 /Posted byBen McDougall

Cyber-criminals are constantly evolving and finding new ways to exploit businesses and gain access to valuable data. With the rise of remote working and increased reliance on technology, it’s crucial to stay informed about the inventive tactics they employ. To help protect your business, we’ve updated our knowledge and outlined some of the tactics cyber-criminals are now using, so you can stay one step ahead.

Phishing Emails & Texts

Cyber-criminals are adept at creating deceptive emails and texts that appear to come from reputable companies, complete with logos and brand colours. They often request you to validate your account by clicking on a link and entering your details. Be cautious and verify with your IT team or consultant if you’re unsure.

Spear Phishing

A more targeted approach, spear phishing emails are designed to look highly convincing and are tailored specifically to an organisation or department. They may contain company-specific details or seem more relevant to your industry. Always report suspicious emails to your IT team to ensure their legitimacy.

Impersonation

Impersonation occurs when cyber-criminals masquerade as colleagues through emails, texts, or phone calls. They might pose as directors, senior managers, or external suppliers you frequently interact with. Such requests often demand urgent action, like initiating a bank transfer or accessing sensitive information. To avoid falling victim, validate requests face to face or with a phone call to confirm their authenticity.

Social Engineering

Social engineering extends beyond online attacks and involves attempts to manipulate individuals within your organization in real-life scenarios. For instance, someone might pose as a visitor requesting access to the server room or impersonate the IT department and ask for login credentials over the phone. Stay vigilant and be cautious about granting access or sharing sensitive information.

Remember, it’s essential to think before you act. Treat any unusual emails or requests with skepticism. Double-check with someone you trust to verify their legitimacy. If in doubt, consult your IT team or IT consultant. Stay proactive and prioritise the security of your business. Better to be safe than sorry.

Greystone: Making sense of IT and software solutions.

Latest Blog Posts

Man leaping from one rock to another with sunset

How to Successfully Transition from In House ...

22 April 2025 Comments Off on How to Successfully Transition from In House IT to Managed IT Support
Larger wooden rocket with smaller rockets aside it

The Long Term Value of Outsourcing IT. ...

25 March 2025 Comments Off on The Long Term Value of Outsourcing IT. Why SMEs Thrive with Managed Support.
Man sat at laptop with small green office block

Driving Sustainability Across Business and Technology Operations 

26 February 2025 Comments Off on Driving Sustainability Across Business and Technology Operations 
Multiple office windows

The IT Implications of Employers Moving Employees ...

19 February 2025 Comments Off on The IT Implications of Employers Moving Employees Back to the Office Full Time

What UK SMEs Need to Know to ...

30 January 2025 Comments Off on What UK SMEs Need to Know to Stay Competitive In 2025

Categories

  • Cloud
  • Greystone News
  • IT Security
  • IT Support
  • Management Consulting
  • Networking
  • Servers
  • Software Development
  • Uncategorised

Our Partners

aws partner network

microsoft partner

databarracks

internet central

highlander

mitigate

cyfor

huntress

pax8

Twitter Linkedin

0161 726 5020 | info@greystone.co.uk

Copyright | Cookie Policy | Terms & Conditions | Privacy Policy | Sitemap

Play It Green

Cyber Essentials

Website design by Creative Essence.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok