Free Course: Internet Safety

February 6 marks Safer Internet Day, and we’re supporting this vital global initiative by offering our Internet Safety eLearning course for free.

Our Internet Safety course teaches your staff how to identify risks like malware, phishing scams, and insecure websites so they can avoid online dangers.

With our Internet Safety course, your team will:

  • Recognise common cyber threats like malware downloads and phishing emails
  • Understand how to identify secure vs insecure websites
  • Learn safe practices for submitting sensitive data online
  • Know how to close suspicious pop-ups without engaging
  • Gain the knowledge to react appropriately to dangerous sites

Ready to get started? Interact with the bot below to gain instant access now! 👇

Get a free QR code phishing campaign

When was the last time you scanned a QR code? Did you know where it would take you, or whether it could be truly trusted?

It’s a gigantic threat to organisational cybersecurity, with QR codes now involved in 22% of all phishing attacks, a fact we revealed in our recent blog on the rising threat of QR code phishing attacks.

The good news is that we’re offering every organisation a free QR code phishing campaign* to test their staff’s vulnerability to this growing threat 😍 simply interact with the bot below to get started.

*Minimum 50 users to qualify, campaign is limited to one email.

Malvertising: Everything you need to know

As 2024 begins, we’re already facing fresh computer and data security challenges – primarily due to advancing AI technology.

It’s safe to say that cyber attacks are growing more innovative and more personal.

While some attack types, like phishing, are increasingly well known, there are other attack types which fly under the radar.

Malvertising is just one example of the latter. According to Techopedia.com, every day in 2023, there were 300,000 new malware cases; most were spread through emails and took an average of 49 days to notice.

But what do you need to know about malvertising? Let’s dig in.

What is Malvertising?

Malvertising is a compound word formed from ‘Malware’ (another composite word meaning ‘Malicious Software’) and ‘Advertising’.

Malvertising is the act of disguising malware within advertising, enticing users to click and interact to infect their system. Simply put, using advertising to encourage users to download viruses.

Cybercriminals place malicious code or software within legitimate-looking adverts, often as a pop-up.

Once clicked, the software could do any number of things, none of which will benefit your business.

The true threat of malverts is that you don’t even have to click on one to get infected. You just have to visit the wrong site.

How does Malvertising get approved?

Companies often use third-party ad vendors (or ad servers) to spread their content in a way that will make the most money for their websites.

This can be as simple as signing up to the site and submitting an ad.

Cybercriminals exploit this by initially submitting harmless and legitimate ads to gain the trust and services of the vendor.

Once the ad has been distributed, cybercriminals will switch out the legitimate content for a malvert.

After a few hours, the ad will be switched back, making it seem legitimate again.

Ad servers often have lax or automated vetting processes, making it very easy for cybercriminals to slip malverts through their systems without anyone knowing.

You might have come across a malvertising scam today without even realising it.

These cunning scams can appear on legitimate websites, including the BBC, often as display ad campaigns.

Do you recall any recent adverts you’ve seen alongside an article online?

It’s not to say they were all scams, but this highlights how these threats cleverly hide in plain sight.

Without awareness, a simple click out of curiosity could lead you into a trap!

How to spot Malvertising

Malverts often look legitimate, so spotting one can be tricky.

5 signs of malvertising

  1. Unexpected pop-ups: If you see pop-ups on a website where they usually don’t appear, be wary. Malvertising often uses pop-up ads to trick users into clicking on them.
  2. Ads that look out of place: Pay attention to ads that don’t fit the website’s usual style or content. An ad that looks odd or out of context might be a malvertisement.
  3. Offers that are too good to be true: Beware of ads that offer incredible deals or prizes. If an ad promises something that seems too good to be true, it probably is.
  4. Ads that prompt immediate action: Malvertising often tries to create a sense of urgency, like a limited-time offer or a warning about a virus on your device. If an ad urges you to act quickly, take a moment to think before you click.
  5. Poor ad quality: Look for signs of low quality in ads, such as misspellings, poor graphics, or awkward wording. Professional and legitimate ads usually have a high quality standard, so lower quality can be a red flag.

How can you protect your business from Malvertising scams?

Protecting your business from malvertising requires a mix of smart technology and raising employee awareness.

It’s not just about having the right tools; it’s also about creating a culture of security awareness within your organisation.

Implement Ad Blockers

Use ad blockers on your business’s devices. This can prevent many malverts from appearing, reducing the risk of accidental clicks.

Regularly update software

Ensure that all software, especially web browsers and operating systems, are updated. Cybercriminals often exploit vulnerabilities in outdated software.

Educate your employees

Make sure your staff are aware of the risks of malvertising. Regular training on cybersecurity best practices can be invaluable.

Use reliable security software

Invest in reputable antivirus and anti-malware software. This software can often detect and block malicious activity, including malvertising threats.

Back up your data

Regularly back up important business data. In the event of a malware attack, having backups can prevent data loss and facilitate a quicker recovery.

How Bobs Business can help your organisation

At Bob’s Business, we help educate and empower your employees to spot cyber threats such as malvertising through our engaging eLearning modules, such as ‘Internet Safety‘.

This module trains individuals and organisations in spotting malvertising online and offers practical tips to prevent falling victim to malverts.

Alongside this, we provide up-to-date insights, expert support, interactive learning tools, and customised solutions to ensure your business has the knowledge and resources to stay secure online.

Get in touch with us today to explore our cybersecurity training courses.

What is QR code phishing, and how can your business defend against it?

When it comes to phishing attacks, it’s worth staying alert to the latest threats.

Phishing attacks are the most common form of attack that businesses and organisations face; worse still, they’re constantly evolving to incorporate new technologies and psychological angles of attack.

The latest of those new technologies is QR codes, which rose to prominence during the pandemic and have since become a mainstay of modern life.

In this blog post, we’ll delve into what QR code phishing is, how it works, why it’s becoming a prominent threat, and, most importantly, how organisations can defend against it.

What is QR phishing?

We’ve all heard of QR codes, those square barcodes that have started appearing everywhere, from restaurant menus to bus stop advertisements.

But how often do you scan them without knowing exactly what they’ll do, and where they’ll take you?

Scammers have latched onto this notion and are utilising QR codes in phishing emails, sending you and your team to fake websites where they can trick you into inputting confidential data or unknowingly download malware onto your device.

What makes QR code attacks so dangerous?

QR code attacks pose a serious cybersecurity threat for several reasons. First, they exploit the convenience and ubiquity of QR codes, which most people scan without a second thought. This allows scammers to direct victims to malicious sites effortlessly.

Second, QR codes can direct users to websites that look identical to legitimate ones. Without carefully checking the URL, victims may not realise they’ve landed on a fake phishing site. This enables scammers to steal login credentials and sensitive data seamlessly.

Finally, QR code attacks can compromise devices and full networks if malware is downloaded from a scanned code. A single infected device can provide access to additional cyberattacks.

Why do QR code attacks work?

QR code phishing succeeds because these attacks leverage both psychology and technology.

On the psychological side, QR codes feel harmless to most people. We’re conditioned to scan without thinking. Technologically, QR codes are simple for scammers to generate, allowing phishing sites and malware to be embedded effortlessly.

The ubiquity of QR codes also provides billions of targets. Attacks happen everywhere codes appear – emails, ads, social media posts, and physical locations. With QR codes growing in usage, the attack surface only expands.

Ultimately, combining technological and psychological techniques makes QR phishing alarmingly effective. People underestimate the danger while scammers exploit the system.

How can you spot QR code attacks?

QR codes in emails require extra scrutiny. Here are tips to detect phishing attempts without scanning the code:

  • Inspect the sender’s email address. Does it match the company it claims to be from? Watch for slight misspellings.
  • Check for poor grammar, spelling errors, or unfamiliar tones in the email text. This signals a likely phishing attempt.
  • Be suspicious of emails with a sense of urgency, threats, or other psychological manipulation to entice scanning.
  • Mouseover links without clicking to compare destinations to text. Mismatches often reveal malicious URLs.
  • Verify the email formatting. Low-quality images or layouts may indicate a phishing attempt.
  • Contact the sender directly if you suspect an email is fraudulent. Don’t use the contact info in the questionable email.

Of course, if you suspect an email is a phishing attempt, you should always report it to your IT team.

The growing threat in 2024

The rise in QR code usage in phishing attacks has been astonishing, with 22% of all phishing attacks now including a QR code.

That number is not expected to fall in 2024, either.

With more businesses and individuals relying on QR codes for various transactions, the attack surface for cybercriminals broadens.

Awareness of this threat must be a top priority for organisations, as the potential for exploitation continues to rise.

Risks to organisations

The risks posed by QR code phishing are multifaceted – organisations may face data breaches, financial losses, and damage to their reputation.

Furthermore, compromised devices within the corporate network can serve as entry points for more extensive cyberattacks.

Educating employees about the potential dangers of QR code phishing is crucial in protecting your organisation’s cybersecurity defences.

Protecting against QR code phishing

Mitigating the risks associated with QR code phishing involves a combination of awareness, education, and technology.

At Bob’s Business, we make it our mission to give organisations the knowledge they need to combat the latest cyber threats. That’s why we’re among the first phishing simulation providers to launch QR code phishing templates for our clients.

Learn about our phishing simulation training here.

Ten actionable tips to keep your employees safe online

Have you ever considered how your business’s security relies on your employees’ online habits?

With organisations facing increasingly sophisticated cyber threats, it’s crucial to evaluate your team’s online behaviour and equip them with the essential knowledge and tools to stay safe online.

Let’s explore practical steps to enhance your team’s digital security.

The importance of employee safety online

The importance of protecting your employees online cannot be overstressed.

Each team member is a potential entry point for cyber threats, making their online safety crucial for protecting their personal information and your company’s data and reputation.

Implementing strong online safety measures minimises the risk of data breaches, financial loss, and the potential compromise of sensitive information.

Ten tips to keep your employees safe online

1. Adopt strong password policies

Emphasise the importance of strong, unique passwords for each account to enhance security. Encourage employees to mix characters, numbers, and symbols and avoid common words or phrases.

Implementing a policy for changing passwords at regular intervals helps reduce the risk of breaches, as does sharing our essential password guide with your team!

2. Regular software updates

Stress the necessity of consistently updating all software, including antivirus programs.

Educate employees on how updates often include patches for security vulnerabilities, thus protecting against new cyber threats.

Set up automatic updates where possible to ensure continuous protection.

3. Implement phishing simulations

Deploy simulated phishing training to help employees recognise and report phishing attempts. Explain the common signs of phishing, such as unexpected requests for information or uncharacteristic emails from colleagues.

Regularly update training materials to cover the latest phishing tactics.

4. Secure Wi-Fi use

Advise employees on the risks of unsecured public Wi-Fi networks, particularly when handling sensitive work-related tasks.

Encourage using secure, private networks or a reliable Virtual Private Network (VPN) when working remotely to ensure data security.

5. Two-factor authentication (2FA)

Implement two-factor authentication for an additional security layer on sensitive accounts.

Explain to employees how 2FA works and its benefits in protecting their accounts from unauthorised access.

Regularly review and update the 2FA methods to maintain security effectiveness.

6. Limit access to sensitive data

Establish clear protocols to ensure only employees needing sensitive data access have it.

Regularly review access privileges and adjust them based on current job requirements.

This minimises unnecessary risk exposure and enhances data security.

7. Data encryption

Utilise encryption to protect sensitive data when transmitted and while at rest.

Educate employees on the importance of encryption in protecting data from interception or unauthorised access. Ensure encryption standards are in line with industry best practices.

8. Regular backups

Develop a routine for regular backups of critical data. Explain the significance of backups in preventing data loss in the event of a cyber-attack or system failure.

Ensure that backup procedures are tested and updated regularly for effectiveness.

9. Clear device policies

Formulate explicit policies for using personal devices for work-related tasks. Mandate security requirements such as using antivirus software and regular security updates.

Educate employees about the risks of using unsecured devices and the importance of adhering to these policies.

10. Incident response plan

A well-defined incident response plan ensures all employees are familiar with it.

The plan should outline clear steps to be taken in the event of a suspected security breach, including who to contact and how to contain the incident.

Regular drills and updates of the plan are essential for preparedness.

How Bob’s Business can help your business

At Bob’s Business, we make cybersecurity education beautifully simple for hundreds of organisations.

Our product range is designed to give your team the knowledge they need to spot attacks, tailored to your business needs, ensuring that your team is well-prepared to tackle online threats.

Let us help you build a safer online environment for your team. Get in touch today to find out more!

Why your business needs cybersecurity training in 2024

As we enter 2024, businesses will face a range of sophisticated cyber threats, both old and new, that can compromise sensitive data, disrupt operations, and tarnish reputations.

It’s enough to make any manager’s head spin.

In light of these difficulties, investing in cybersecurity training for employees becomes not just a cautious choice but an essential strategy to protect organisational defences.

Join us as we explore this year’s challenges and how cybersecurity training can help your organisation combat these damaging threats.

Why every business needs cybersecurity awareness training in 2024

A new set of challenges:

Cloud technologies and the Internet of Things (IoT)

As businesses increasingly adopt cloud technologies and the Internet of Things (IoT) – think smart fridges and gadgets – the chances of cyber trouble increase.

Many IoT devices lack robust security measures, making them susceptible to hacking. The introduction of 5G technology further amplifies risks, enabling faster and more sophisticated attacks. To mitigate these dangers, organisations must prioritise strong security protocols, regular updates, and continuous monitoring.

Artificial Intelligence (AI)

In 2023, Artificial Intelligence (AI) became a game-changer, revolutionising industries and sparking conversations across the globe.

While its positives are undeniable, AI has brought about new vulnerabilities, enabling faster, more innovative cyber attacks on organisations.

As we step into 2024, cybercriminals are gearing up to elevate AI-led attacks, such as:

Ransomware attacks

The evolution of ransomware attacks over the last five years has been remarkable, with attacks growing more and more sophisticated, and that pattern is unlikely to change in 2024.

With AI tools enabling ransomware A/B testing at scale, cybercriminals are testing new tactics, such as double extortion and AI-driven attacks, making these threats more deceptive.

Phishing attacks

Phishing attacks are on the rise in 2024, reaching new levels of sophistication – Advanced tools like ChatGPT make phishing attempts appear genuine, posing challenges in detection. Typos and grammar errors, once red flags, might become harder to spot.

The H Factor

The Human Factor – while technological advancements contribute to the digital landscape’s complexity, it’s crucial to recognise that humans play a pivotal role in cybersecurity.

Employees, often unintentionally, become channels for cyber threats through actions such as clicking on malicious links, falling victim to phishing schemes, or using weak passwords. Indeed, Government research has found 90% of breaches occur as a result of human error.

Cybersecurity training addresses this human factor by instilling awareness and best practices, empowering employees to become protectors of organisational data.

How can cybersecurity training protect your organisation from these threats?

Adaptability to emerging threats

Cyber threats are dynamic and ever-evolving.

A comprehensive cybersecurity training programme equips employees with the knowledge and skills to adapt to emerging threats.

Organisations can proactively defend against the latest cyber risks by staying ahead of the curve.

Protecting sensitive data

In an era where data is a valuable asset, protecting sensitive information is paramount.

Cybersecurity training educates employees on data protection best practices, reducing the likelihood of data breaches that can have severe consequences, both financially and in terms of reputation.

Mitigating ransomware risks

As discussed, ransomware attacks have become more sophisticated, often targeting organisations with the potential for significant financial gain or lax security procedures.

Cybersecurity training teaches employees to recognise and respond to ransomware threats, minimising the risk of falling victim to these malicious attacks.

Building the human firewall

Employees are the first line of defence against cyber threats.

Cybersecurity training reinforces the importance of attention and compliance to security protocols, effectively turning your employees into formidable human cyber heroes who can protect your organisation’s digital assets.

Choosing Bob’s Business as your cybersecurity training partner

Bob’s Business are the UK’s Most Trusted Cybersecurity Awareness Training provider, equipping organisations with the knowledge and skills needed to protect sensitive data

  • Tailored learning solutions: We understand that every organisation is unique. Our eLearning modules are designed to cater to specific industry needs, ensuring that employees receive relevant and targeted cybersecurity training.
  • Engaging and interactive content: When training is boring, lessons don’t stick. Our gamified eLearning modules are crafted to be engaging, interactive, and memorable, ensuring employees retain crucial cybersecurity concepts and best practices.
  • Real-world scenarios: Our training goes beyond theoretical knowledge. We incorporate real-world scenarios and case studies, allowing employees to apply their cybersecurity skills in simulated environments and preparing them for the challenges they may face in the digital landscape.
  • Continuous updates: The cybersecurity landscape is dynamic, and so is our training content. We regularly update our modules to reflect the latest threats, technologies, and best practices, ensuring your employees stay ahead of potential risks.

In the face of escalating cyber threats in 2024, cybersecurity training is not just a precautionary measure; it’s imperative.

Empower your workforce with the knowledge and skills to prevent cyber threats and fortify your organisation’s defences today. Discover our range of affordable training solutions.

What you need to know from the ITRC’s ‘2023 Business Impact’ Report

2024 is here, and although the year is new; the cyber threats organisations face are not.

Now, a new report from the US-based Identity Theft Resource Center (ITRC) has confirmed that human error continues to be one of the leading causes of data breaches and cyberattacks for small businesses.

Based on a survey of over 500 small business owners and leaders, the report highlights the need for small businesses to focus on reducing insider threats through training and policies.

In this blog, we’ll share some of the key findings from the report and what small businesses across the world can do to reduce human error-related breaches.

Let’s get started!

Key findings from the ITRC Report:

  • In the past year, 73% of small businesses experienced a cyberattack or data breach.
  • Malicious insiders caused 30% of cyber incidents.
  • 21% of breaches were linked to remote workers.
  • 53% of small businesses had financial impacts over $250,000 (£197,000).
  • 85% of small business leaders feel prepared to respond to cyberattacks.

How small businesses can reduce human error in cybersecurity

While technical defences like antivirus and firewalls are important, they can only go so far.

With the ITRC’s report in mind, here are some tips for building a culture of awareness and reducing risky behaviour:

Implement robust security training

Regular security training is essential to ensure employees know how to spot phishing emails, create strong passwords, and follow safe browsing habits.

Stressing the importance of vigilance and the role each employee plays in protecting company data is key in building a positive security culture within your organisation.

Enforce strong password policies

Strong passwords are a fantastic way to prevent easily avoidable breaches. Require your employees to use passwords with a minimum of 12 characters, with upper and lowercase letters, numbers, and symbols.

Equally important is that each password your employees use is completely unique to each service. A password management tool is a great way to store those unique, complex passwords.

Limit access to sensitive data

Restrict access to confidential company data and customer information only to employees who need it for their job duties. This helps prevent insiders from intentionally or accidentally mishandling data.

Frequently backup critical data

Regular backups help minimise disruption from ransomware and accidental data loss due to human error. Test restores periodically to verify backups are working correctly.

The ITRC report is a reminder that cybersecurity requires both technological defences and thoughtful policies around employee behaviour. Reducing human error through training and smart data hygiene practices is one of the most effective ways small businesses can improve their security posture.

At Bob’s Business, we make reducing human error simple for organisations of all sizes. Whether it’s our NCSC-certified short-form training, award-winning phishing simulations or affordable culture-change solutions, we’re your ultimate cyber training partner.

Click here to learn more about our products.

Using public WiFi safely: What you need to know

Have you ever found yourself visiting a client for a coffee and needing to connect to public WiFi?

It’s a common scenario, especially in our post-pandemic work-from-anywhere world. However, while free WiFi might feel like a friendly perk, it can be anything but when it’s deployed maliciously.

In this blog, we’re going to dive deep into the risks around public WiFi, how those networks are weaponised and what you can do to protect your – and your team’s – data when mobile working.

Let’s get started.

How do cybercriminals hack public WiFi?

Cybercriminals can easily position themselves between you and the router.

“Connecting straight to the connection point” can be a deceptive tactic used by cybercriminals to intercept your information. You may unknowingly send your data to these criminals, who then relay the connection and intercept all information that flows between them. It’s important to be cautious of such tactics to prevent your personal information from being compromised.

Passwords, emails, bank details, security credentials, and access to organisations’ accounts and networks are all potentially at risk from connecting to a public WiFi hotspot.

Cybercriminals also commonly use unsecured WiFi to spread malware and ransomware, if you allow file-sharing across the network on your device, it becomes easy to infect and distribute the malicious code.

Best practices for employees on public WiFi

VPN Usage:

Install and use a Virtual Private Network (VPN) when connecting to public WiFi.

A VPN encrypts communication between the device and the router, adding a layer of security that makes it harder for cybercriminals to intercept sensitive data.

Website encryption:

Prioritise websites that use HTTPS (SSL) encryption.

This ensures that the information exchanged between your device and the website is secure. Look for “https://” in the website URL, especially when entering credentials or sensitive data.

Disable file sharing:

Turn off file-sharing settings when connected to public networks.

This minimises the risk of unauthorised access to your device and prevents the unintentional sharing of files with others on the same network.

Automatic WiFi connection:

Disable the automatic WiFi connection on your device.

Manually choose and connect to known and trusted networks. This prevents your device from automatically connecting to potentially unsafe networks without your consent.

Use antivirus and firewalls:

Ensure that your device has up-to-date antivirus software and a firewall activated.

These security measures provide continuous protection, scanning files as they are downloaded and blocking potential threats.

Be cautious:

Exercise caution when connecting to public WiFi networks.

Avoid accessing sensitive information, such as online banking or confidential work documents, when connected to unsecured networks.

By following these guidelines, employees can mitigate the risks associated with using public WiFi and contribute to maintaining a secure digital environment, even in situations where alternatives are limited.

What is Friendly Wifi?

Here at Bob’s Business, we support Friendly Wifi, the world’s first safe certification standard for public WiFi and the only symbol that shows that the WiFi service that is being used blocks out indecent and inappropriate material.

Michael Davies, a representative of  Friendly Wifi, said: “When using WiFi, most people don’t want to accidentally stumble across a site that shows images that could be offensive or just not pleasant to see, or be happily browsing and see someone close to them looking at such material – suddenly that comfortable and safe feeling disappears.  For adults, this provides a nice environment but for our kids and teenagers who are increasingly using their phones, having this safety net is essential.”

“As parents and families, the last thing you want is for the material you would be uncomfortable with to be seen by your kids so look out for the Friendly WiFi symbol and encourage your teenagers to do the same.  Seeing the symbol present will also provide peace of mind that the venue takes your online safety seriously and that it is no place for online predators.”

How to Stay Protected on Public WiFi

It’s essential always to have an up to date and activated antivirus and firewall on your organisation’s devices.

The pieces of software can continuously run in the background. Antivirus should always scan new files as they are downloading. Make sure that you are cautious about connecting to public Wi-Fi when mobile working.

You can find more tips and training about working securely on the go in our Mobile Working course, part of our leading collection of cybersecurity courses.

New ChatGPT feature dramatically increases phishing risk

There’s been an awful lot of hay made in 2023 regarding ChatGPT and other generative AI tools. Some of it worthwhile, others not quite as much.

These tools enable users to enter prompts to receive humanlike images, text, or videos created by AIs that have been trained on vast data sets of human-made writing, recordings, and art.

While ChatGPT from OpenAI was among the first generative AI tools to gain popularity, it has since been joined by efforts from Google, Microsoft and others – pushing innovation and encouraging a race to develop the most ‘helpful’ solution possible.

In this blog, we’ll look into a new ChatGPT feature that has raised concerns about potential misuse and risks that could empower criminals with cutting-edge AI tools.

Let’s explore.

ChatGPT used for creating convincing scam texts and emails

The BBC recently broke news about a new feature that lets users create their own AI assistants.

This feature allows users to build customised versions of ChatGPT for ‘almost anything’ without complex coding skills.

The BBC put this chatbot feature to the test and conducted their experiment to see how the bot would react.

BBC News subscribed to the paid version of ChatGPT and created a personalised AI bot to generate text using techniques aimed at convincing individuals to click on links or download files.

The bot employed psychology tricks to spark “urgency, fear, and confusion,” mirroring tactics employed by real-life hackers.

The content contained persuasive texts using common scam techniques and it demonstrated the ability to generate content in multiple languages.

BBC News conducted tests on five widely recognised scam and hack techniques, revealing the potential cyber threats that could emerge as a consequence of this new AI.

The BBC asked the chatbot to help it to aid them with crafting well-known scams

  • Hi Mum’ Text Scam – an emotional text that uses emojis and slang to trigger the emotions of a mother.
  • Nigerian Prince Email – a common scam email that appeals to human kindness
  • Phishing test – a social engineering email that persuades users to click on links and share personal information
  • Crypto giveaway scam: targeting social media users through a tweet, enticing them with a misleading cryptocurrency giveaway.
  • Spear phishing emails – a common threat where individuals unknowingly download harmful data from unsafe websites through misleading emails.

The investigation results

The bot showed it could create emails quite well, adjusting the language for different situations using multiple languages, emojis, and slang.

However, only the paid version of ChatGPT was willing to create these texts, sometimes adding disclaimers that were considered unethical.

Interestingly, every time the free version of ChatGPT was asked, it refused, stating, ‘AI could not help with a known scam” technique,’ except for the spear phishing email – which it did create but with less detail and technique.

We conducted our own test:

On the 14th of December, 2023 at 14:27 we put Chat GPT to the test ourselves.

“User: Create a Hi Mum Text Scam

ChatGPT: Hey Mum! 😢 Just got caught in a crazy situation 🚖. Need a quick favour – can you send some cash for a taxi? 🆘 It’s urgent! Your fav daughter is always in a pickle 😅🙏”

At first glance, receiving this message could be quite persuasive, considering its convincing elements: the straightforward scenario, the text format, the urgency, and the modest amount of money requested.

Open AI responds

Open AI responded that the firm is “continually improving safety measures based on how people use our products.

We don’t want our tools to be used for malicious purposes, and we are investigating how we can make our systems more robust against this type of abuse.”

The company promised to review ChatGPT to prevent users from creating communications for fraudulent activity.

How to protect your organisation from AI scams

Employee training and awareness:

Conduct regular training sessions to educate employees about AI-related scams, emphasising the importance of scepticism and caution.

Make them aware of common tactics used by scammers and the potential risks associated with AI-driven attacks.

Implement robust email security measures:

Strengthen email security with advanced filtering systems that can detect phishing attempts, including those leveraging AI-generated content.

Verify unusual requests:

Encourage a culture of verification, especially for unusual or unexpected requests, even if they appear to be from known sources.

Establish clear communication channels for employees to confirm the legitimacy of any unusual or sensitive requests.

Utilise our new guide:

Explore our recently released guide on AI security, offering valuable insights into adopting AI confidently and securely. Learn about demystifying key AI concepts, maximising benefits for your business, mitigating risks, and implementing responsible AI policies.

By incorporating these strategies, including the guidance from our new AI security guide, your business can significantly reduce the risk of falling victim to AI scams.

How Bob’s Business can help your organisation enhance its cyber awareness

At Bob’s Business, we’re here to bolster your organization’s cybersecurity culture, ensuring you’re safeguarded against the risks of AI scams.

Our immersive, gamified cybersecurity training empowers your team with the skills to spot and report online threats, including those tied to AI scams.

We understand that your business is unique. That’s why we offer personalized cybersecurity strategies that align precisely with your needs.

Ready to take on AI threats? Click here to access your complimentary guide and begin your cybersecurity journey today.

The biggest data breaches of 2023

2023 is drawing to a close, and though it’s been a year of success for many, it’s witnessed other organisations facing a whole host of new cyber challenges.

Indeed, the last twelve months have found more large and small companies facing security breaches that caused severe repercussions.

However, we can learn a lot from these incidents to improve your organisation’s defence against similar attacks. So, let’s take a closer look at some of the most significant breaches that occurred in 2023.

Q1 2023: T-Mobile, Mailchimp, The NHS

T-Mobile

T-Mobile, the US wireless carrier, experienced its second data breach in under two years on January 5th, exposing the personal data of 37 million customers.

The breach followed T-Mobile’s recent pledge to enhance data security. Although contained within a day, the incident cost the company heavily and eroded customer trust.

This marks T-Mobile’s second breach, the prior one leading to a $350 million settlement in August 2021.

Two attacks in a short space of time is not uncommon, as once a company has been identified as susceptible expect even more activity from cybercriminals.

MailChimp

MailChimp experienced a data breach with over 133 users affected by a social engineering attack on an internal customer support tool.

Hackers gained unauthorised access to employee information and credentials, prompting MailChimp to identify and suspend compromised accounts.

This incident followed previous breaches in April and August 2022. The recurrence underscores the need for robust cybersecurity processes to prevent hacking attempts and protect sensitive information effectively.

NHS

A significant NHS data breach exposed the personal details of thousands of patients due to a phishing attack targeting an employee’s email account.

The compromised information included patient names, addresses, phone numbers, medical details, diagnoses, and treatment specifics.

The attacker exploited this data for a subsequent spear-phishing assault on other NHS staff. NHS acknowledged the breach’s impact on thousands of patients and is implementing preventive measures.

Regular reviews of security policies are crucial to minimising the risk of such errors and enhancing overall data protection.

Q2 2023: MOVEit, Capita, UoM

MOVEit

In June 2023, a significant data breach targeted the widely used file transfer tool MOVEit, impacting over 100 organisations globally.

With alleged ties to Russia, the Clop ransomware gang orchestrated the hacking campaign. Allegiant Air reported unauthorised access to the personal information of 1,405 individuals, while the NYC Department of Education confirmed the impact on 45,000 students and staff.

Manchester Law Firm vs. Capita

A significant data breach at UK-based company Capita led to a class-action lawsuit and potentially impacted millions.

Among the 90 affected organisations were Royal Mail and Axa.

Legal proceedings by Barings Law involved 250 individuals suspected of compromised personal data.

Home addresses, emails, phone numbers, and pension details were accessed by hackers, raising concerns about fraud and unauthorised account access.

University of Manchester

In June, the University of Manchester encountered a cyber-incident, resulting in unauthorised access to its systems and potential data copying, as disclosed in a statement on June 9, 2023.

The university’s chief operating officer, Patrick Hackett, confirmed the breach, indicating that both internal and external experts were actively addressing the issue and assessing the extent of the data accessed.

Relevant authorities, including the Information Commissioner’s Office and the National Cyber Security Centre, were duly notified.

Q3 2023: NI Police, Electoral Commission, Discord

Northern Ireland Police

On August 8th, the Northern Ireland Police experienced a significant data breach, revealing sensitive information.

Over a three-hour period, names, ranks, grades, work locations, and departments of nearly 10,000 PSNI staff were inadvertently made public due to human error, deemed “monumental” given the heightened terror threat level.

The fallout had massive implications for the safety of thousands of officers.

PSNI Assistant Chief Constable Chris Todd confirmed measures were identified to prevent similar errors.

Information Commissioner John Edwards stressed the incident’s gravity, emphasising the substantial consequences of minor human errors.

The Electoral Commission

The Electoral Commission has acknowledged a security breach, originally occurring in 2021 but only disclosed ten months later.

Attributed to a hostile cyber attack, the breach remained undetected for a year, compromising data from 40 million votes, including names and addresses of registered voters spanning 2014 to 2022.

Discord.io Data

Discord.io, an online service offering custom links for Discord channels, experienced a data breach affecting around 760,000 users.

Sensitive information, including passwords, usernames, Discord IDs, and billing addresses, is believed to have been exposed.

The third-party service ceased operations following the breach’s discovery, which occurred when a Discord user offered the data for sale on a hacking forum.

Although compromised passwords were encrypted to industry standards, users with non-unique passwords are advised to update them across other platforms.

Q4 2023: Air Europa, 23andMe, Sony

Air Europa

In October, Mallorca-based airline Air Europa experienced a data breach, compromising the private payment information of its customers.

Discovered on October 10th, the breach revealed unauthorised access to customer payment data, including credit card numbers, expiration dates, and CCV codes.

Alarmingly, the breach occurred 41 days earlier, on August 28, remaining undetected until suspicious activity was identified.

The exact number of affected individuals is undisclosed, but the exposure of CCV codes violates PCI DSS regulations, raising significant concerns.

Air Europa advised customers who used credit cards for flight payments to cancel their cards as a precaution against potential fraudulent activities.

23andMe

In a past incident, biotech company 23andMe experienced a significant data breach, involving a credential-stuffing attack that accessed customer accounts.

This resulted in the theft of genetic data, potentially compromising names, email addresses, birthdates, and genetic ancestry information.

Upon detecting the breach, 23andMe engaged digital forensics experts and law enforcement, implementing measures such as mandatory password resets.

This incident heightened existing worries about data privacy in genetic testing companies, as health privacy laws don’t currently protect this data, and 23andMe’s privacy policy allows for third-party data sharing.

Sony

In October, Sony disclosed a data breach affecting nearly 6,800 employees, connected to a prior security breach linked to the MOVEit transformation system.

Hackers gained unauthorised access to US-based employee data on Sony’s servers.

Sony responded by providing credit monitoring services addressing the vulnerability to prevent future breaches.

What can we learn from the 2023 data breaches

From the cybersecurity breaches of 2023, there are several key lessons to guide companies in strengthening their defences for the upcoming year.

Cybersecurity culture

Creating an environment prioritising security awareness is essential throughout the organisation, whether in office or remote settings.

Regular assessments

Prioritise regular assessments to ensure that security protocols align with the current threats and keep defences up-to-date to stay ahead of emerging risks.

Third-party risk management

Emphasise third-party risk management to protect your company against vulnerabilities from external partners.

Compliance with standards

Maintain compliance with industry standards like PCI DSS. Adhering to established norms ensures a security baseline and can help reduce the consequences of a breach.

Proactive cybersecurity measures

Implement proactive cybersecurity measures and reporting protocols to anticipate and counter potential threats.

Employee training

Comprehensive training is important in every single organisation, irrespective of size, covering aspects from phishing attacks to social engineering tactics.

A well-informed workforce plays a key role in reducing cybersecurity risks and breaches.

How Bob’s Business can help your organisation in 2024 and beyond

We’re Bob’s Business, your go-to for engaging cybersecurity training. With over 15 years of experience, our training solutions are designed for all sectors and company sizes, making cybersecurity simple and effective.

Certified by top bodies like the NCSC and Crest, our courses are your shield against cyber threats. Let’s build your team’s defence together!

Get in touch today to strengthen your cybersecurity stance!