The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

Latest phishing tricks

Phishers are continually coming up with new tricks to get users to click on malicious links and share sensitive login information. Enterprise phishing attacks predominantly take the form of simple credential phishing emails, i.e., attempts to trick an employee into...

Multi-factor authentication for online services

Advice for organisations on implementing multi-factor authentication (or two-factor authentication) to protect against password guessing and theft on online services. This guidance describes how to use multi-factor authentication (MFA) to mitigate against password...

Setting up two-factor authentication (2FA)

How setting up 2FA can help protect your online accounts, even if your password is stolen. Introduction This guidance explains how you can set up two-factor authentication (2FA) on your important online accounts. Doing this makes it harder for criminals to access your...

End user device (EUD) security guidance

Guidance for organisations deploying a range of end user device platforms as part of a remote working solution Introduction Modern smartphones, laptops and tablets provide users with great flexibility and functionality, and include security technologies to help...

Emotet Malware – What is it?

Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)...