News | 5 May 2021

The five whys of information security

The '5 whys' is a handy tool that can be used to help analyse the underlying cause of information security incidents (data breaches). In 2020, 37% of companies in the UK reported an information security incident...

Read this article
Image of filing cabinet and paper folders - The five whys of information security

News | 15 April 2021

Preventing fraud on social media: Fraud Advisory Panel statement

The Fraud Advisory Panel has published a joint statement on preventing fraud on social media. Social media has featured in at least 61,000 crime reports to Action Fraud...

Read this article
Preventing fraud on social media - fraud advisory panel PDF

News | 26 October 2020

Phishing and its risks

Phishing is when cybercriminals attempt to trick you into giving away information. This usually occurs via email but can also be received on a text message, by phone, letter...

Read this article
Phishing wide infographic Veritau

News | 25 October 2020

What is whaling?

Whaling is where a cybercriminal impersonates a senior member of staff and sends a communication under their guise. It's similar to phishing but specifically targets senior people...

Read this article
What is whaling wide infographic Veritau

News | 24 October 2020

Password security

We all know how important password security is. If a hacker is able to access your account, they could obtain dangerous information, install malware, steal data, or attempt a cyber-fraud…

Read this article
Password security wide infographic Veritau

News | 23 October 2020

5 fundamentals for an effective incident response programme

Coronavirus has brought into sharp focus the importance of organisational resilience and preparedness for all organisations. Uncertainty...

Read this article
Effective incident response programme wide infographic Veritau

News | 29 April 2020

Remote working: 9 tips for keeping data secure

Keeping data secure is always important, and can be difficult during remote working. One of the key principles of GDPR is the security principle, which builds on the requirement in…

Read this article
Photo of hands typing on laptop - Keeping data secure while remote working during Covid

News | 20 April 2020

7 types of fraud on the rise due to coronavirus

Fraud might be the last thing on your mind during this crisis, but sadly criminals will take advantage of any situation. Here are seven types of fraud on the rise…

Read this article
Man sat in dark room looking at computer - 7 types of fraud on the rise during coronavirus

News | 27 March 2020

Coronavirus scams: fraud alert

Fraud might be the last thing on your mind during this crisis, but sadly criminals will take advantage of any situation. This is no different with the coronavirus pandemic. Action…

Read this article
Graphic of laptop with warning sign - Coronavirus scams fraud alert

News | 5 February 2020

Infrastructure payment scam

We’ve been alerted to a new infrastructure payment scam. Fraudsters are targeting Community Infrastructure Levy (CIL) payments from developers. A CIL payment is...

Read this article
Image of meeting at table with hard hats - Infrastructure payment scam - Veritau

News | 14 October 2019

Ransomware: what is it and how can you protect yourself?

What is ransomware? Ransomware is a type of malware that infects the computer system, demanding a payment to release the locked data or system. This may arrive through phishing or…

Read this article
What is ransomware infographic - Veritau