Yusra Shaeik

What is Business Email Compromise? (And why is it so dangerous?)

Business Email Compromise attacks are on the rise. This kind of sophisticated cyber attack uses legitimate-seeming emails to convince you or a member of your team to send money or sensitive data. The best BEC attacks are nowhere near as easy to detect as you might imagine. And for thousands of businesses around the world

How not to compromise cybersecurity while maximising your productivity

One of the biggest objections to good cybersecurity practices from business owners is the imagined hit to productivity. Luckily, the latest security measures don’t reduce your productivity. They boost it. The combination of MFA (Multi-Factor Authentication) and SSO (Single Sign-On) gives you excellent security while streamlining your team’s workflows. They aren’t complicated to put in

What is Single Sign-On (and why might your business need it)?

One password for this app. Another for that device. An IT team constantly fielding login reset requests. If that’s your business’s daily reality, Single Sign-On could be just the thing you’re looking for. This already widely-used authentication scheme means you only need a single ID to log onto a whole bunch of individual (though related)

Is AI all hype? DAG in promotional script snafu

You know the drill. Your business is launching new services. How will you market them? At Dial A Geek, we thought we’d get ChatGPT to give us a clue. It left us thinking: is AI all hype? Because the result we got back when asking for a one-minute promotional video script was… Well. It was

Advanced threat protection against phishing: how to protect your business

Over 9 out of 10 cyber attacks start with an “innocent” email. That’s why it’s vital that you have advanced threat protection against phishing in place and ready to protect your business. Because, unfortunately, the human link in your cybersecurity chain is almost always weaker than your other defences. Your first fix is easy, of

Google Meet vs Teams – what’s better for business use?

Work from home cybersecurity with MFA and SSO

Google Meet vs Teams. It’s become a perennial question for decision-makers. Out of the two big names in workplace collaboration, what’s better for business use? Let’s take a look at it from a couple of different angles: Is Google Meet better than Microsoft Teams? This is one of the most common ways to phrase the

Cybersecurity vs compliance – do you know how they differ?

Cybersecurity and compliance are terms that are often used interchangeably. You can see why. Both are all about helping you manage your organisation’s digital security. But – and this is a big but – each has a very different motivation, focus, and methods attached to it: Compliance is driven by business needs. It’s often designed

What is penetration testing (and who should do it)? 

Do you need to be absolutely sure there are zero holes in your cybersecurity protections that an attacker could exploit? If so, learning what penetration testing is all about might be for you. But penetration testing isn’t for everyone. Smaller businesses can often get by without this kind of intensive, active test of their cybersecurity.

What is ISO 27001, why have it, who needs it, how to get it

ISO 27001 and cybersecurity compliance

If you want to protect your business’s information, it’s an ideal standard to meet. But what is ISO 27001 really? Why would you want it? Who would benefit from it? How do you get it? Let’s take a look at why this internationally accepted standard for Information Security is so valuable for businesses in every

Have you ticked off your end of year office IT checklist?

It’s beginning to feel a lot like… time to turn everything off before you high-tail it for the snowy hills. But have you ticked off your end of year office IT checklist? Before you sign off for Christmas, make sure you’ve done all of the following: Your end of year IT checklist 1) Turn off