

Publish Date
04/09/2024
Categories
Blogs
Over time, as cybersecurity solutions have become more effective, low-effort, high-volume cyberattacks are no longer successful for bad actors. In 2021, Microsoft was able to block over 9.6 billion malware threats and more than 35.7 billion phishing emails.
This increase in effectiveness is in part due to the advancements in AI technology used within modern cybersecurity solutions. This allows them to stop zero-day exploits and reduce the chance of businesses falling victim to a variety of attacks.
However, as these low-effort attacks are no longer viable for cybercriminals, some have shifted their focus away from targeting technology to hacking humans. These are known as social engineering attacks. In this blog, we will explore some key social engineering tactics, find out what is at risk if your business falls victim to one of these attacks, and what steps you can take to reduce your cyber risk.
Social engineering attacks are a broad category of cyberattacks that include some form of psychological manipulation to trick employees into sharing confidential or sensitive information. These attacks rely on human interaction and can be conducted via email, phone call, SMS, instant messaging or in-person communication.
Whilst a well-crafted social engineering attack does take time and expertise, they are a common method for cybercriminals, as it is easier to exploit vulnerabilities within humans than in software. For example, it is much easier to trick an employee into sharing their password, rather than brute forcing a password. Did you know that an 8-character password has over six quadrillion possible combinations?
The first stage of any social engineering attack is investigation. In order to craft an attack, the bad actor needs to have an understanding of the target organisation and employee. This stage is also known as open-source intelligence (OSINT) gathering, as the collection of data is gathered from publicly available sources. Some of these sources include public social media accounts, Google Maps images of office spaces, company websites and viewing EXIF data from images.
Once the bad actor has researched their target, the next stage begins, the hook. This is when the cybercriminal engages the target and starts manipulating them into forming a relationship or trusting them. A common method to develop this trust is reciprocity, whereby the bad actor gives the target some information or does a favour for them, knowing that in the future the victim will be more likely to reciprocate and share sensitive information.
Once the cybercriminal has been able to expand their foothold, they can execute the attack. This may include a phishing attack, credential theft, planting of malware or physically entering an office space. Depending on how effective the investigation and hook were, the target may not even realise they are under attack.
If this is the case, the final stage is to exit. This is where the cybercriminal removes traces of malware, covers their tracks and ends their relationship with the target individual.
To illustrate the potential fallout from a social engineering attack, and some of the common forms of attack, we have 3 recent examples.
In late 2021, email security provider INKY detected several phishing emails that were impersonating the United States Department of Labor (DoL). The phishing emails targeted stakeholders, asking them to submit a bid for a government project.
In order to ‘submit the bid’ they had to open the attached PDF and click the ‘BID’ button. This took the victim to a malicious website, with the same HTML and CSS as the real DoL website. From here, they were prompted to log in with their Microsoft 365 credentials, and upon submission, the hacker was able to harvest all the credentials, without the victim even knowing.

In 2019, the CEO of an unnamed UK-based energy firm was contacted by who they thought was their boss, demanding a €220,000 bank transfer to a Hungarian supplier. The call did not raise suspicion for the CEO, as the person on the other end of the phone had the same accent and intonation as his German boss. However, this was not the case, as it is believed that the voice on the other end of the phone was an AI-based voice generation software.
The attack was successful, and the money was transferred to a fraudulent account. This is a prime example of a novel social engineering attack, as it was only successful as the attacker had previously researched the victim, and crafted the attack to manipulate the CEO.
A few years ago, a Lithuanian man crafted the largest social engineering attack of all time. He created a fraudulent company, pretending to be a computer manufacturer working with Google and Facebook. He then targeted specific individuals within those two companies, invoicing them for goods and services that a real manufacturer had provided.
Over 2 years, the man was able to fraudulently obtain over $100 million from Facebook and Google and was only caught 2 years after the attack.
It can be difficult to protect your business against complex social engineering attacks, especially as security solutions cannot supply 100% protection against many of the tactics used in these attacks.
With phishing emails being the most common form of social engineering attack, businesses should look for a holistic email security solution. This will block potential phishing emails, protect against malicious URLs, perform file analysis on attachments, and enable DMARC.
However, email security and phishing prevention will not stop vishing attacks, in-person attacks, or phishing attacks not carried out via corporate email. In order to safeguard against these attacks, businesses need to have a strong cybersecurity education and awareness training program. This will ensure that employees are aware of common social engineer attack methods, and how to detect and report them.
Finally, it goes without saying that all businesses should have multifactor authentication enabled. This simple control can stop 99.9% of account compromise attacks and does not take long to enable. With MFA, even if an employee shares their password with a bad actor, they will not be able to log in without the additional authentication method.
For businesses without security expertise, social engineering attacks can be difficult to protect against. Especially if your business does not already have a comprehensive cybersecurity awareness training program.
If you are concerned about your organisation’s security posture, contact us today and we can help ensure you’re doing everything you can to reduce your overall cyber risk.

Publish Date
02/09/2024
Categories
Blogs Hot Topic
While the internet has many benefits for modern businesses, there are also some issues to be aware of within the online space. With this, it’s vital to be aware of the malicious actions that a bad-faith actor can take to, at worst, damage your company.
Emails are one of the most vulnerable points at which your company could be in danger. With many different attacks and vulnerabilities involving social engineering, even a simple click on a link within an email could cause tons of damage. But some methods are more dangerous than others.
In this article, we’re going to go over the difference between spam emails and phishing emails, and how you can protect your business from them.
Spam email (or junk mail) is a type of email that is quite common online. In fact, you probably have at least some spams within your email ‘Spam’ folder right now.
These kinds of emails are simply just a form of mass marketing, that is used to advertise a service (whether it be a legitimate service or a scam) for sale to a large number of people with ease.
Email spammers tend to acquire their victims’ email addresses from a wide range of sources and constantly bulk-send advertisements to their list of emails, not caring about who’s on there.
Commonly, you’ll see spam emails advertising adult websites, gambling websites, and insurance websites. These are usually scams, though it’s incredibly easy to tell that these emails are spam and will be put into your email client’s spam folder automatically, so you don’t have to manually delete them.
However, even newsletters and other opt-in emails from legitimate places are seen as spam. Generally, spam is just unwanted/unsolicited emails, and there’s nothing inherently malicious about another email saying that there’s a sale at a clothes shop — even if they can be annoying.
Phishing is much more dangerous and malicious, however…
A phishing email is an email that is designed to intentionally deceive the recipient into giving access to an account or service. This social engineering scam is one of the most dangerous online attacks, as it takes advantage of unsuspecting or vulnerable people first and foremost.
Unlike low-effort spam mail, these emails are designed to trick unsuspecting victims into handing over sensitive information such as passwords, bank information, and even administrative access to a business system in the worst case.
The key to phishing scams is that they look legitimate at first glance and are designed to trigger the recipient to panic. They’ll often say something like “Your account has withdrawn £1294.90” and look deceptively similar to an email from a bank — in the example of a bank phishing scam — and will redirect you to a fake login portal to try to get you to enter your bank login.
These emails are easy to spot to the trained eye — as we’ll go over further on — but even those who are experts can be tricked. For example, famous cybersecurity expert and scam exposer Jim Browning fell victim to a very realistic-looking phishing attack that temporarily restricted access to his whole YouTube channel.
This video is his recounting of the scam, and is a great example of the types of high-level phishing attacks that you may encounter:
With these attacks becoming harder to spot every day, it’s important to educate yourself on how to stop them. To do so, you need to know the key differences between general spam and phishing.
Otherwise, there isn’t much of a difference between the two, as phishing is generally considered to be a type of spam email. However, while spam is usually annoying and harmless, phishing is deadly and dangerous.
There are several steps that your business can take to protect itself from spam and (more importantly) phishing.
1) Recognise the Signs of a Phishing Attack
Phishing attacks will often have some telltale signs that will be able to signal to you that they’re coming from a malicious source.
Generally, when using your judgement, be suspicious of any email you receive in general. Make sure to do the correct research before taking action.
2) Ensure Company-Wide Training and Security Compliance
It’s great that you know the signs. But, if your employees don’t, they could fall victim to an attack without knowing.
By ensuring that everyone is prepared and knowledgeable about the risks of phishing, you protect your company.
3) Implement System-Wide Measures to Protect Your Company
Even with all of this, humans make mistakes. Sometimes, you’ll click a bad link by accident. Ensuring that there are systems in place for this is important.
With the looming threat of phishing and spam being a serious consideration for any business, knowing how to protect yourself is vital for the success of any business. Knowing the key risk factors and threats that could put your business in danger is important, as acknowledging these risks is the best way to stop them.
Are you looking to implement securities and strengthen your company’s vulnerability against social engineering attacks? Get in touch with us today! Our experts are here to help and can easily make sure that your company has every base covered.

Publish Date
27/08/2024
Categories
Blogs Events & Webinars Hot Topic Services & Solutions
In the fast-paced digital world, email remains a cornerstone of business communication. Every day, a staggering 361.6 billion emails are sent and received globally, a number set to rise to 392.5 billion within the next two years. This exponential growth highlights the increasing reliance on email in our daily business operations. However, with its ease, speed, and cost-effectiveness comes a significant drawback—email is the preferred entry point for cybercriminals looking to exploit vulnerabilities and gain access to sensitive data. The consequences of these breaches can be devastating, ranging from reputational damage to operational disruptions, and significant financial loss.
Alarmingly, over 90% of cyberattacks start with an email. These attacks are becoming more sophisticated, often designed to bypass even the most robust defences, such as those provided by Microsoft. The evolving threat landscape demands a more advanced approach to email security—one that not only addresses current threats but anticipates future risks.
As cyber threats continue to evolve, Mimecast is at the forefront of email security innovation, leveraging the power of AI to strengthen defences. Mimecast’s Email Security Cloud Integrated solution is specifically engineered to enhance and extend the protections offered by Microsoft 365. This cutting-edge solution empowers organizations to stay ahead of cybercriminals by providing a robust, flexible, and highly effective defence against email-borne threats.
Mimecast’s approach to email security is focuses on customer needs, offering solutions that cater to various organizational requirements. Whether a business operates within a complex email environment requiring advanced administrative controls or seeks a solution that can be deployed in minutes and optimized out of the box, Mimecast delivers best-in-class security tailored to meet these diverse needs.
The shift towards remote working has made organizations more vulnerable to cyberattacks. With employees accessing business emails from home, hotels, coffee shops, and even personal devices, the risk of falling victim to email-based threats has never been greater. The distractions of working outside a traditional office environment can lead even the most cautious employees to inadvertently open a malicious email or click on a harmful link.
In this landscape, relying solely on platforms like Microsoft 365 for email security may not be sufficient. Mimecast offers a more comprehensive approach, ensuring that organizations do not have to choose between security and flexibility. Whether through a secure email gateway or an integrated cloud email security solution, Mimecast provides world-class protection that is both effective and easy to manage.
Mimecast’s latest offering, Email Security Cloud Integrated (CI), is designed for simplicity and effectiveness. It does not require an MX record change, deploys in minutes, and provides optimized protection right out of the box. This makes it an ideal choice for IT and security teams looking to bolster their defences with minimal administrative burden.
To help organizations navigate the increasingly complex email security landscape, we are hosting an exclusive webinar with Mimecast on Wednesday, September 25th, at 3 PM GST. Titled ‘Email Security 2024 – Top Threats & Smart Solutions’, this webinar will provide invaluable insights into the most pressing cyber threats facing businesses today and how to safeguard operations.
During the webinar, industry experts will cover:
Participants will also gain access to a free 30-day trial of Mimecast’s world-class email protection and can also engage directly with Mimecast experts about their specific threat concerns.
Don’t miss this opportunity to strengthen your email security strategy. Sign up today and ensure your business is protected against the cyber threats of tomorrow.

Publish Date
06/08/2024
Categories
Blogs Hot Topic Services & Solutions
The recent CrowdStrike outage was a significant disruption for many organizations, shedding light on the substantial consequences of critical system failures. Unlike cyberattacks, this incident demonstrated that even non-malicious failures could have extensive impacts. Here, we delve into the lessons that businesses should learn from this event to fortify their systems against future disruptions.
One of the primary takeaways from the CrowdStrike outage is the importance of having a resilient culture within an organization. It’s not just about having a crisis management framework but regularly testing it to identify and address any vulnerabilities. This proactive approach ensures that when a real crisis occurs, the organization can handle it effectively and minimize damage.
Regardless of its cause, downtime can have devastating effects on a business, including:
In the case of ransomware attacks, the situation can be even worse. Such attacks often leave organizations with no viable workarounds, causing severe operational disruptions, data loss, and financial repercussions.
The CrowdStrike outage highlighted the vulnerability of even the most robust systems, underscoring the need for strong cybersecurity measures to prevent attacks and ensure quick recovery from unforeseen failures.
The financial impact of IT downtime is staggering. Companies are losing billions annually due to unexpected system failures like the CrowdStrike outage. Despite this, many organizations still fail to improve their ability to address these issues promptly. The reality is that the chance of downtime is increasing, and the mantra “it’s not if, it’s when” is becoming commonplace among cybersecurity experts.
Small businesses are often prime targets for malicious emails, with one in 323 being harmful. Additionally, the average office worker receives 121 emails per day. Alarmingly, one-third of small businesses with 50 or fewer employees rely on free consumer-grade cybersecurity solutions. The Hiscox Cyber Insurance Readiness Report 2023 revealed:
These statistics emphasize the critical need for robust cybersecurity measures and quick incident response protocols.
Clear accountability within an organization for managing cybersecurity risks is essential. Typically, the IT Lead is responsible for the overarching cybersecurity strategy, but every employee has a role in maintaining security protocols and reporting suspicious activities. As Microsoft advises, regular data backups and having a well-defined disaster recovery plan are crucial.
The CrowdStrike outage serves as a wake-up call for businesses to reassess their IT strategies. To mitigate the risks associated with IT downtime, consider the following steps:
The CrowdStrike outage has provided valuable lessons on the cost of downtime. No one thinks it will happen to them—until it does. By learning from these experiences and taking proactive measures, businesses can better safeguard their operations and minimize the financial and operational impact of future disruptions.
As a Managed Service Provider (MSP), we are committed to providing and maintaining secure and resilient IT infrastructures. If you’re interested in mitigating the risk of downtime and want a no-obligation discussion around email security, backup & disaster recovery, or security awareness and testing for staff, contact us now: email: sales.uae@cobweb.com or call +971 4 455 3100.

Publish Date
01/08/2024
Categories
Blogs Events & Webinars Hot Topic
In the fast-paced world of Architecture, Engineering, and Construction (AEC), data generation is at an all-time high. Construction companies are producing over 2.5 quintillion bytes of data daily, yet a staggering 95.5% of this mission-critical resource remains untapped. This latent potential results in missed opportunities for achieving operational excellence and managing rapidly escalating storage costs.
AEC firms generate massive data volumes, encompassing design drawings, 3D models, project documentation, and more. Efficiently storing, organizing, and accessing this data poses significant challenges. Key concerns include data security, version control, and facilitating collaboration among remote teams. As the industry continues to evolve, staying abreast of current trends in data management is essential.
Secure Private Cloud Storage: Providing flexibility and scalability while ensuring data integrity.
Data Organization Techniques: Enhancing data accessibility and retrieval.
Data Governance Frameworks: Maintaining data quality, security, and compliance throughout project lifecycles.
Integration of BIM Technologies: Adopting Building Information Modelling (BIM) to streamline data processes.
Artificial Intelligence: Leveraging AI for data processing and automation.
Data Analytics: Extracting valuable insights for decision-making and improved project outcomes.
However, many AEC firms struggle with ineffective management of unstructured data, often due to fragmented silos spread across various applications, tools, and systems. This fragmentation hampers the ability to manage, and analyse, data effectively, thereby diminishing strategic advantages.
To address these challenges, we have teamed up with Europe’s Tiger Technology to host an exclusive webinar focused on innovative data management solutions tailored for the AEC industry. This webinar – Building The Future: Overcoming Data Challenges & Storage Costs – will delve into how Tiger Technology’s software-only product can help AEC organizations efficiently manage their data and will include live demo of its Tiger Bridge solution.
If you’re in the AEC industry, don’t miss this opportunity to stay ahead of the curve and revolutionize your data management strategy. Join us on Wednesday, August 14th at 3pm Dubai time for this exclusive webinar and begin to unlock the full potential of your data.
To register, simply complete the registration form below. We look forward to equipping you with the knowledge and tools to overcome data challenges and storage complexities, ensuring your firm can leverage data for operational excellence and strategic advantage.

Publish Date
09/07/2024
Categories
Blogs Hot Topic Services & Solutions
Email remains the prime gateway for cyberattacks and the bad guys are getting better at breaking through. That’s the conclusion of Mimecast, the leading email gateway defender.
Mimecast latest State of Email Security report should be a wake-up call for all businesses out there.
The report says the cybersecurity landscape is becoming more vulnerable as email usage is rising in 8 out of 10 companies with 59% reporting cyberattacks are increasingly sophisticated.
The report also shows:
Get Defensive:
Mounting a secure defence against these increasing risks means competing for expert talent and then retaining it! Inhouse experts must be skilled in prevention and remediation to ensure swift business continuity and ring fence reputation!
Cybercriminals operate round the clock, and it takes, on average, 212 days to detect a data breach, another 75 days to contain it, and globally, the average data breach cost is $4.35 mn.
A subscription-based Cobweb managed security service is the optimum defence arsenal with experts providing a 24/7 service to intervene, prevent and remediate.
Register here for a free cybersecurity solutions assessment.

Publish Date
09/07/2024
Categories
Blogs Hot Topic Services & Solutions
Cloud data security and back-up leader Acronis is warning of a new wave of cyberthreats emerging as bad actors add Generative AI to their toolboxes.
Acronis has identified rises in:
Staying Safe:
To stay secure in this increasingly complex cyberthreat landscape Acronis recommends:
To find out how Cobweb MENA & Acronis can help keep you safe, reach out to us here for a security assessment.

Publish Date
08/07/2024
Categories
Blogs Hot Topic
The integration of AI into the workplace has reached a pivotal moment. According to the latest Work Trend Index Annual Report by Microsoft and LinkedIn, 75% of global knowledge workers are already using AI, with nearly half of them adopting it in just the past six months. This rapid adoption signals a clear demand from employees for AI tools that enhance productivity, creativity, and job satisfaction. However, it also highlights a pressing need for businesses to develop comprehensive AI strategies to attract and retain top talent.
Employee Demand for AI
Employees are not just passively accepting AI; they are actively bringing it into their workplaces. The report reveals that 78% of AI users are bringing their own AI tools to work (BYOAI), a trend that spans across all generations, from Gen Z to Boomers. This grassroots adoption underscores a critical point: employees recognize the transformative potential of AI and are not waiting for their employers to catch up.
AI benefits are evident in the survey responses:
90% of users say AI helps them save time.
85% report that AI enables them to focus on their most important tasks.
84% feel that AI boosts their creativity.
83% enjoy their work more when using AI.
These statistics demonstrate that AI is not just a luxury but a necessity for enhancing employee performance and satisfaction.
Leadership Lagging in AI Adoption?
While 79% of leaders acknowledge that adopting AI is essential for staying competitive, there is a significant gap in implementation. 59% of leaders are concerned about quantifying the productivity gains from AI, and 60% believe their organization lacks a clear plan and vision for AI integration. This hesitation is costly, as it leads to missed opportunities for leveraging AI to drive business transformation and growth.
Karim R. Lakhani, Chair of the Digital Data Design Institute at Harvard, emphasizes the responsibility of leaders to integrate AI thoughtfully:
“We’re at the forefront of integrating AI to not just work faster, but to work smarter. It’s our responsibility as organizational leaders to ensure that this technology elevates our teams’ creativity and aligns with our ethical values.”
The AI Strategy Imperative:
To address these challenges and capitalize on AI’s potential, businesses must develop and implement robust AI strategies. This involves:
Where Next?
For businesses, the message is clear: an AI strategy is essential for attracting and retaining top talent. Microsoft’s generative AI assistant Copilot is your AI journey starting point. To find out more and secure our free Copilot demo, reach out to us now on email: sales.uae@cobweb.com or call +971 4 455 3100.

Publish Date
01/07/2024
Categories
Blogs Hot Topic
In just 45 minutes we can introduce you to a generative AI-powered solution which is literally transforming operations within the travel and hospitality industries making them quicker and leaner and pushing productivity to new heights.
We’re talking about Expedite – our AI-powered, context driven, data extraction and management solution. This breakthrough business tool is the first of its kind which combines Open AI, App and Data solutions to solve a complex issue which has plagued the travel and hospitality sectors – how to successfully, and quickly extract and validate data from messy documents. Expedite extracts and validates data from unstructured documents and does it accurately and within context while taking account of a range of nuances including special promotions and seasonal variations.
It enables travel and hospitality providers to:
Expedite was recently the star of Microsoft’s ‘At The Forefront’ digital solutions webinar series and it made for insightful, valuable content with a demonstration of this breakthrough solution in action.
If you missed the webinar – you can access it by registering here. It could be the best 45 minutes of business know-how you’ll gain this year.
Sales.uae@cobweb.com +971-4-427-2420 www.cobweb.ae

Publish Date
24/06/2024
Categories
Blogs Hot Topic
The new Microsoft CIO Strategy Guide reveals that 92% of organization are exploring, piloting, or implementing generative AI solutions and cite lofty expectations for the technology. So, what has got them so excited? It is the technology’s ability to rapidly process large data sets to create text, generate images, perform basic computing tasks and, most importantly, its ability to surmount innovation obstacles.
Employees report that innovation obstacles include:
Not enough focus time: 68% say they lack time to focus during their workday thereby limiting their innovation abilities.
Time consuming email search: 62% say they spend as much as 8.8 hours a week searching for work related emails.
Meetings Overload: Employees report spending as much as 7.5 hours a week in meetings.
The Convince Factors:
These results have helped convince 50% of surveyed organisations that GenAI will improve employee productivity:
55% expect GenAI to deliver business outcomes and enable employees to focus on value added tasks.
And, despite fear factor discussions about job losses circulating, 70% of employees say they would delegate everyday work tasks to AI.
How Can It Help?
The large language models (LLMs) of GenAI platforms and tools, such as Microsoft 365’s Copilot AI assistant, speech up the process of finding information by unifying enterprise data across applications, making contextualised available within seconds. This massively helps in:
All this saves valuable work time making focus time more available.
Proof points:
77% of early Microsoft Copilot adopters report significant benefits including:
What Next?
Want to join the increasing number of organizations reaping the business benefits of Microsoft Copilot?
Sales.uae@cobweb.com +971-4-427-2420 www.cobweb.ae