loader from loading.io

Do you know your phishing from your vishing or smishing?

Techcess: embracing technology and success in your business

Release Date: 08/31/2022

Cyber Essentials certification soon requires cloud services multi-factor authentication - are you prepared for it? show art Cyber Essentials certification soon requires cloud services multi-factor authentication - are you prepared for it?

Techcess: embracing technology and success in your business

The grace period is coming to an end - Cyber essentials certification will soon mean Multi-FActor authentication is a must! from explains why you need to think about how prepared you are for the change over! The grace period for cyber essentials certification is coming to an end! Listen to learn how you can be ready!  You've had your grace period. And the big updates to Cyber Essentials certification requirements are looming fast. Are you ready?  One of the big requirements of the certification that are coming into effect early next year, is Multi-Factor Authentication on your...

info_outline
Zoom wants to be the new Teams show art Zoom wants to be the new Teams

Techcess: embracing technology and success in your business

Is teams about to be unseated as the business suite master? This bonus episode brings us up to date on this potential update to Zoom!   You think , you think video calls. For millions around the world, it’s a tool they rely on at work every day. But for productivity, collaboration and workplace integration (as well as video calls), it’s  that’s leading the way. But for how much longer? Listen to this latest Tech Update to find out! Full episodes of "Techcess" If you want to check out our full episodes, covering everything from how to protect your business from a...

info_outline
Learn why now is the BEST time to invest in your IT - UK Government will pay you! show art Learn why now is the BEST time to invest in your IT - UK Government will pay you!

Techcess: embracing technology and success in your business

Have you planned your next major IT purchases yet? from explains why now is the perfect time for you to think about kitting out your IT  You've got a bit of time left to take advantage of a major saving through your tax liability - but you've got to be quick!  It's not every day the government pressures you to treat yourself to a new toy. So the fact they're asking you to do so now, and even offering to pay you to do it (kinda!) is a good reason for you to take notice! Thanks to a tax office initiative, you'll be able to invest in your IT and buy brand new equipment, and you'll...

info_outline
Why you will not be fine on this Cloud9! New online scam to watch out for. show art Why you will not be fine on this Cloud9! New online scam to watch out for.

Techcess: embracing technology and success in your business

The latest dangerous online scam will not leave you feeling like you're on cloud9! This bonus episode brings us up to date on the latest scam!   We go to a lot of effort working to protect our clients from online security threats. These could come in the form of key loggers that record you as you enter your login information, or (Distributed Denial of Service) attacks, which overwhelm a service with fake traffic, causing it to crash. As part of our service, we always advise our clients to install software updates as soon as they become available, and support them through the process where...

info_outline
The biggest threat to your business.. is on your own payroll! Get control of your cybersecurity... show art The biggest threat to your business.. is on your own payroll! Get control of your cybersecurity...

Techcess: embracing technology and success in your business

Do you know where your biggest security leaks are? from explains how your biggest one could be drawing a wage... from you! Have you addressed the biggest security leaks in your business? Someone working for you right now is also working alongside some of the world's most successful cybercriminals. Yep, we know. It's hard to believe that. Who could it be? Your team is lovely. None of them could ever want to do any harm to you, your business owners or the company overall, right? Well, it may sound like the plot to the latest Bond movie, but someone somewhere within your organisation could be...

info_outline
Are you losing hours each week setting up video calls? show art Are you losing hours each week setting up video calls?

Techcess: embracing technology and success in your business

Are you losing hours each week setting up video calls? This bonus episode brings us more info on how to get some of our time back!   You could be losing a full-time working week for every member of your team, thanks to the hassle of setting up video calls.  has revolutionised team meetings, and saves a huge amount of travel time. But we’re still not getting the full benefit from the new technology, according to new research.   Full episodes of "Techcess" If you want to check out our full episodes, covering everything from how to protect your business from a phishing attack,...

info_outline
Zapier Integrations: How to get your IT systems talking to eachother - the 'holy grail' of tech! show art Zapier Integrations: How to get your IT systems talking to eachother - the 'holy grail' of tech!

Techcess: embracing technology and success in your business

Want your systems to talk to eachother? from explains how you can get your IT software to sing in harmony! Do you use integrations in your business? If you're not using automations and integrations in your business, now's the time to start. There are lots of tools that can do this job for you, but our favourite here at is Zapier. With Zapier, you can remove around 40% of your repeat tasks without having to worry about them again other than maintaining them. Automations and integrations can help with everything from email responses to social media posting, and in this episode, Mark Riddell...

info_outline
Don’t walk the plank with pirated software show art Don’t walk the plank with pirated software

Techcess: embracing technology and success in your business

Are you risking everything in your business by using dodgy software? This bonus episode brings us a stark warning about using 'warez' in your business   A huge number of small and medium-sized businesses would consider using pirated software to try and save money. A new study has revealed a surprising number of businesses willing to  to save costs. Our advice? Think twice before you walk the plank.   Full episodes of "Techcess" If you want to check out our full episodes, covering everything from how to protect your business from a phishing attack, through to how you can...

info_outline
How To Get Faster Wi-Fi In Your Office And For Remote Workers show art How To Get Faster Wi-Fi In Your Office And For Remote Workers

Techcess: embracing technology and success in your business

Need to get faster wifi in your office? from explains everything you need to know about juicing up your internet signals Do you rely on Wi-Fi signals for your business operations? Let's be honest about it, without good Wi-Fi, we don't have the first hope of things running smoothly in our businesses. And that's why it's super important to ensure your Wi-Fi connections are super solid whether your workers are in the office or working remotely. Thankfully, there are some specific IT and Wi-Fi tips and tricks our Techcess team can share with you in this week's episode! For example, did you know...

info_outline
Could avatars make your Microsoft Teams meetings more fun? show art Could avatars make your Microsoft Teams meetings more fun?

Techcess: embracing technology and success in your business

Are you using avatars on your Microsoft Teams calls? This bonus episode brings us some ideas for 'shaking up' video calls   Do you inwardly (or outwardly) groan at the thought of yet another video call? They’re now a normal part of our working lives, but it doesn’t make them any more exciting. Good news: Microsoft is introducing Metaverse-style avatars, called Mesh avatars, to Teams....   Full episodes of "Techcess" If you want to check out our full episodes, covering everything from how to protect your business from a phishing attack, through to how you can effectively manage...

info_outline
 
More Episodes

What are the different types of hacking your business can be at risk from?

mark from m3 Networks explains the 6 different phishing styles to be aware of in your business

Do you know all about phishing vishing and smishing?

Phishing, vishing, smishing - all types of cyberattacks that you need to be aware of.

You probably already know all about phishing, and if you don't you can check out our other episodes of Techcess in which we ran you through what those are how they work.

Here you go!

https://www.techcesspodcast.com/how-to-spot-a-phishing-attack-top-tips-for-preventing-social-engineering-techcess/

https://www.techcesspodcast.com/what-is-business-email-compromise-bec-aka-phishing-how-scammers-trick-you-into-sending-them-money-and-how-you-can-prevent-it-techcess-technology-business-success/

But to summarise right now, in short someone sends you a fake email that looks like it's from a credible source in order to get you to click on a link or give away your personal information.

Let's draw on episode eight of Techcess for a quick catch up on phishing...

"So we're talking purely about being able to spot efficient emails and some of the ways that attackers will try and trick you into taking some action or doing whatever is they want you. So the first thing we are gonna talk about is who the email was from. Okay. So focusing on the, from header in your email, now, I just want to say, if you are checking your email on your phone, you quite often do not see the actual email address that the email comes from.

You'll just see the sender's name and that name can be made up to be anything, regardless of who the email address is from. Okay. You wanna make sure if you're on a mobile you'd normally if you click on the email name, it will expand and I'll actually show you the email address that email came from. So that's the first thing to check, and we know that I think it's about 70% of email is read on a mobile phone.

So it's quite a common thing. So make sure you are checking that you can see the phone address on your smartphone or tablet or one of them word device you're using to read your email. So the first thing. Do you recognize the sender's email address? And that seems quite an obvious one, but you know, make sure that the email address is someone that you would normally or regularly communicate with."

If you want you can click here to listen to more of that episode that goes more in depth on phishing:!

 

The dangers of phishing style attacks

In this episode we wanted you to be made fully aware of the growing dangers of cyberattacks as these hackers and their methods become more sophisticated.

All of these attacks are very common and can be very successful, so it's important to be aware of them and know how to protect yourself.

One of the best ways to protect yourself is to never click on links or respond to messages from sources that you don't trust.

You should also never give out your personal information unless you're sure that the source is legitimate.

And always best to make sure that your computer is protected with antivirus software and a firewall.

If you prefer reading to listening, you can download the full printable written-to-be-read transcript of the episode by clicking the below link.

Episode 56 transcript

Mark from m3 Networks talks us through everything we need to know when it comes to being aware of these cyberthreats.

 

In an area with restricted data? Click this for a smaller sized version of the episode.

 

Episode transcript preview

You would have probably already seen the link to the PDF above.

Here's a very quick sneak preview of that transcript of episode 56 

 

"And the first one is vishing and that's spelt with a V and this is like a fishing attack, but it's done over the phone. Now someone will call and they'll pretend to be a person or a company that, you know, potentially a supplier, perhaps even one of your customers.

Or a representative of them. They'll ask you to take action such as giving them remote access to your device or visiting a website.

Now you imagine if someone phoned up pretending to be from your IT support company, asking one of your users to give them remote access to one of their computers. I mean, if your IT company is a huge company with hundreds of technicians it might be very, very difficult for you to know who all those people are. So it might be really easy for a scammer to convince someone, to give them remote access to their machine?"

 

Want to get more 'Techcess' in your business?

Book a free chat with Mark!

Get more valuable technology insights from m3's blog pages, here.

Mark Riddell's technology podcast "Techcess" is an m3 Networks production. Mark and the team have created this podcast to help you and their clients understand how technology can help them in their industry and business, including helping them with cyber security solutions. To find out more about Mark Riddell and the rest of the m3 team, visit them here and follow them on Linkedin.

If you want to get in touch about technology or cyber security, just address an email directly at Mark here. He'll be very happy to hear from you.

Thanks for listening! If you enjoy this episode, make sure you follow the podcast via your favourite app.

Fancy giving the Techcess technology podcast a review and rating? Click here - https://www.techcesspodcast.com 

 

Techcess is a podcast from m3 Networks

Transcript provided by Podknows Podcasting