What To Do When You're Hit By a Breach

• in categories: advice • by: Michelle Balestrat

It can happen to the best of us: responding to a legitimate-looking form, or identity data getting leaked publicly. Whether you’ve been phished, hacked, or just struck it unlucky – the result is the same: your identity is now in the hands of some unsavoury characters.

A coffee mug laying sideways, spilling coffee onto tax returns and documents.

While advice about preventing identity theft is easy to find (and definitely what you should be doing first), what can you do if the worst actually happens? These damage control strategies can help.

Read More

Petya? WannaCry? Preventing Ransomware 101

• in categories: advice • by: Michelle Balestrat

UPDATE (29/06/2017): In response to the latest Petya and WannaCry outbreaks, we’ve updated our ransomware guide for these latest threats.

Ransomware: it’s a particularly nasty form of malware that can keep your entire machine under locks. It seems as though each week, a disturbing new variant emerges that’s more powerful (and more contagious) than the last.

This time, it’s Petya and WannaCry striking fear into the hearts of businesses and home users alike.

A blister pack of red pills on a white background.

Is there anything you can do to reduce your risk? Here’s our guide to avoiding these threats.

Read More

3 Ways to Fight Nuisance Calls

• in categories: advice • by: Michelle Balestrat

Nuisance calls: most of us have had to deal with them. They might be asking us to complete surveys, serving us cold-calling advertising for products we don’t want, or even pretending to be something they’re not.

(Image) A compass on a white background.

Besides being a pure annoyance, they can also pose a tangible risk to your security, with the possibility of voice-recording scams confirmed by security experts.

Want to learn how to preserve your sanity and reduce your risk of being tele-scammed on your mobile? Check out our top 3 recommendations.

Read More

Spotting Tracking Apps

• in categories: advice • by: Michelle Balestrat

Spyware is concerning enough on your laptop or desktop computer, but with GPS capabilities, a wealth of personal information and private messages, it’s an even more terrifying prospect on your mobile device.

(Image) A compass on a white background.

Tracking apps have consistently made headlines in recent years, used by everyone from disgruntled spouses and concerned parents to law enforcement.

However, they can also come packaged with otherwise-desirable apps found on the Google Play and other app stores.

Would you know if you were being tracked? Read on to find out.

Read More

Artificial Intelligence: The Future of Security?

• in categories: advice • by: Michelle Balestrat

No matter how great our defences become, it seems that hackers are always a step ahead. However, with new developments in Artificial Intelligence, could security breaches become a thing of the past?

(Image) A toy robot greets a toy chimp in front of a white background.

Far beyond the simple-to-detect DDOS, new attack technologies now used against websites can be very difficult to differentiate from normal user activity.

Suspicious usage patterns are becoming ever more stealthy, leaving cybersecurity experts worried that we may be nearing the limits of human ability to predict and uncover attacks before they strike.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 2 of 20