Blog
Home Smart Assistants
Home Smart Devices Smart speakers (or voice-enabled assistants) can perform many different services, triggered by voice commands from the user including, but not limited to, playing music, providing weather and traffic updates and keeping notes. There are four main...
What are CTFs?
What is a CTF? CTF stands for Capture the Flag. In the Cyber Security world this relates to an event where the aim is to hack into systems and find flags to earn points, pride or bragging rights. The flags can be hidden in a multitude of different places...
Zoom Meetings Security
By now most people will have used or at least heard of Zoom and subsequently some of the privacy and security issues that have been brought up surrounding the service. This means we need to configure the software to help avoid some issues and Zoom...
COVID-19/Coronavirus Phishing Attacks
The spread of Coronavirus has now made it an increasingly common topic which criminals are attempting to exploit for their own gain.These attacks are usually repackaged and reimagined versions of pre-existing ones. Spam messages are using news sources as a...
When Ransomware Strikes
Redcar and Cleveland Council were attacked with ransomware on Saturday, February 8th. The council website is still not fully operational today, and this is only one of the consequences of the attack. Staff had to resort to pen and paper, and press reports...
Setting up two-factor authentication (2FA)
How setting up 2FA can help protect your online accounts, even if your password is stolen.This guidance explains how you can set up two-factor authentication (2FA) on your important online accounts. Doing this makes it harder for criminals to access your...
10 Steps: Home and Mobile Working
Summary Mobile working and remote system access offers great business benefits but exposes new risks that need to be managed. You should establish risk based policies and procedures that support mobile working or remote access to systems that...
Six simple steps to avoid being hacked
With the increasing number of hacks affecting individuals and organisations, we have come up with our six top tips on how to avoid being a victim of a hack. Suspicious of emails Many cyber attacks are founded through email campaigns containing...
CONTACT US
Registered office and postal address
Whiteleaf Business Centre,
11 Little Balmer,
Buckingham,
United Kingdom,
MK18 1TF
+44 (0)20 3441 7642
info@sikercyber.com
FOLLOW US
We have a regional office located in: Edinburgh, UK
Siker Ltd is registered in England & Wales
Company Registration Number No. 11208267
QUICK LINKS
ACCREDITATIONS