Protecting your business
THE POTENTIAL DAMAGE AND LOSSES (PERSONAL, PRACTICAL AND FINANCIAL) ARE ENORMOUS. THEY INCLUDE:
– FINANCIAL LOSS
– REPUTATIONAL DAMAGE
– PROFESSIONAL SANCTIONS
– BREACH OF STATUTORY AND REGULATORY REQUIREMENTS
– BREACH OF PROFESSIONAL DUTIES TO YOUR CLIENTS
IN-HOUSE TRAINING PACKAGE PROVIDES COMPREHENSIVE COACHING FOR YOUR TEAM. GIVING ALL THE ESSENTIALS INTO A 1 FULL DAYS TUITION.
Over 50's Coaching
It's a fact today that a person over 50 is a victim of a scam or fraud every 8 seconds in the UK. We offer a back to basics course which anyone can do with our step by step coaching. Giving you the tools to stay safe online and on the phone. So If you are in a club or society or if you want to get a few friends together we will come to you and offer an easy approach to stay safe. Contact us to find out more
Schools and Colleges
STAY SAFE ONLINE
One of the biggest crimes today is identity theft and sadly social media is an easy route for scammers and fraudsters offering cheap designer products to gain as much information and money as they can. We also offer training and advice based around apps which are growing every day.
we have a range of coaching programmes to suit all needs and budgets. Contact us to find out more
Real case study...
You don’t need to be a huge company to be specifically targeted by criminal hackers
An employee responsible for handling the company finances knew that a meeting to finalise the acquisition of another company was in progress. He received the email: ‘Hey, the deal is done. Please transfer $8m to this account to finalise the acquisition ASAP. Needs to be done before the end of the day. Thanks.’ The employee thought nothing of it and sent the funds over, ticking it off his list of jobs before heading home. But alarm bells started to ring when the company that was being acquired called to ask why it had not received the money. An investigation began - $8m was most definitely sent, but where to?
The criminal hacker clearly knew of the meeting in progress. Most likely by intercepting emails over several days or weeks to look for an opportunity for an attack.