Lego Cyber Attack Figure
Lego Cyber Attack Figure

Cyber-criminals are incredibly smart with their attacks. You could be unaware of a breach for weeks, or even months.

Traditionally, when we think of a cyber-attack, we think about being locked out of our computer with a payment demand flashing on the screen. This is often not the case. Occasionally a hacker may gain access to your device and monitor it for periods of time, waiting for an opportunity to exploit a weakness. So how do you spot the signs that you are being, or have been, attacked?

Here are some things that may suggest an incident on your device, or a colleague’s device:

  • Unusual activity on your account
  • People informing you of unusual emails or activity from your domain or account
  • Requests for unauthorised payments
  • Requests for change of details, for example, supplier bank details
  • Immediate demands or unusual pressure from a colleague or supplier
  • Being unable to access files or documents you previously could
  • Being locked out of your accounts
  • Computer running slow
  • Applications randomly closing or quitting
  • Settings on your device being changed
  • Your webcam light is on even though you aren’t using the camera in any applications

Latest Guides

Gamma Horizon Softphone App on Mobile and Desktop
What is a Softphone?
Discover the benefits of moving your business to softphone applications.
OneDrive Icon
When OneDrive for Business Desktop Support is Ending for Windows 7, 8 and 8.1
OneDrive for business support will end later than OneDrive personal on desktop.
Remote Working
How to Stay Secure When Remote Working
Our top tips to keep your data secure, wherever you work.