In the aftermath of this major IT event, is there something everyone can take from this? What can we learn from Waikato DHB, and the pain they are still going through as they restore their systems and their services? For Icon IT, there is one simple answer to this: people click on things they shouldn’t. […]
Case study: My email has been hacked, what do I do now?
No one wants this to happen, but it happens. Somehow, a hacker has got your password and now has control of your email account. It’s a terrible position to be in – especially so if it’s a business or corporate account – but you need to know what to do next. This post comes from […]
Case study: Business owner gets demanding email
A client (who is the business owner) received the below demanding email, and since she had done our Phishing Education session, she didn’t click – thankfully. This is the sort of tone in an email that screams ‘SCAM!’. This is a common scam email to receive, suggesting that you are using copyrighted photos on your […]