Boxphish Blog

Common Phishing emails to look out for in 2022

Common Phishing emails to look out for in 2022

Phishing emails are increasing in 2022 Cyber security training experts, Boxphish, take you through the common Phishing emails to look out for in 2022. Through recent years Cyberattacks have been on the rise and are ever rising still. One of the most common types of...

read more
How to run a successful cyber awareness campaign

How to run a successful cyber awareness campaign

The recent Covid 19 pandemic has changed the way many of us work, bringing many of us from the office to our homes. While adjusting to this major change, new threats have emerged from cyber criminals seeking to exploit employees’ fear and curiosity. This means that...

read more
Another Data Breach? Can Cyber Awareness Training Help?

Another Data Breach? Can Cyber Awareness Training Help?

With A-another Data Breach reported in 2020, can Cyber Awareness Training Help? Throughout August, there did not seem to be a day where there wasn't a data breach or cyber-attack mentioned in the news. At least, it felt that way and the figures speak for themselves....

read more
Savanti: InfoSec questions for Higher Education leaders

Savanti: InfoSec questions for Higher Education leaders

Our friends at Savanti (http://www.savanti.co.uk) have written a very thought provoking article covering important questions for Higher Education leaders. Like many organisations, some universities are struggling to deliver information security (InfoSec) effectively....

read more
The Worst Passwords: How NOT to set a password

The Worst Passwords: How NOT to set a password

The Worst Passwords Over the years it seems that the general public is finally starting to grasp the importance of having a strong and original password to protect their personal data – but, yet again, the annual list of the 100 worst passwords has shown that some...

read more
Mobile Security: How to identify and avoid a mobile hack

Mobile Security: How to identify and avoid a mobile hack

How to identify a mobile phone hack Our mobile devices today are much more than just phones – they hold our bank details, private emails, and essentially all of our online accounts through the use of apps, meaning it is becoming increasingly important to keep them...

read more
Malware: Understanding And Managing The Threat

Malware: Understanding And Managing The Threat

What is Malware? Malware, or malicious software, is an overarching term referring to any program or code designed to cause harm to computers and networks. The main intention of these attacks is typically financial gain or access to confidential data, such as customer...

read more