Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Cyber attacks and info structure management

E3 strives to be at the forefront of digital security and these types of attacks stress the real life consequences that happen when attacks succeed. The world of cyber security comes under threat from attacks frequently and often is thwarted or goes unpublished by the companies that are affected. These attacks often come with a low risk to the general public and are targeted at larger corporations or private companies. However, what recent attacks are helping demonstrate and bring to the general publics attention is the real risks that these attacks can have on our everyday lives.

This attack follows on less than a month from the NHS attacks which saw proportions of the NHS disabled, ultimately affecting the health care and experience of its patients and families that tried to access these.

These types of attacks are part of a larger matrix of targeted attacks with the aim of extorting money from the individuals that are affected by encrypting the systems and demanding a ransom for the access back to these, hence the term “ransomware”.

Even after payment, there is no guarantee that access or control will be given back to the user. So how can this be avoided?

One of the main ways that this type of attack is delivered and spread is by email and their attachments that then work their way through a companies information structure through multiple penetration points and embed themselves in the system.

So we suggest being vigilant both at work and at home to help yourselves and others.

Firstly – Check the email address to make sure you trust its origin. Hackers often use similar addresses to large organisations to try and deceive you. Check the ending, should it have .gov, .com or a country specific denomination at the end of the address?

Secondly – Scan the attachment if you have the facility, make sure the context to the attachment is in keeping with the email itself.

Thirdly – If you’re unsure don’t open it! Better to delete it as most companies will have multiple methods to get into contact with you and if it’s at work speak to your cyber security liaison. The sooner this type of cyber attack is discovered the less damage they can achieve.

Look out in our upcoming blog posts on more from us on how to safeguard you digitally.

Say Hello!
Say Hello!
Get CRUX
Get CRUX
FREE Trial
FREE Trial