Spotting and Reporting Phishing Attacks Phishing is a form of social engineering attack that involves a cyber-criminal using scam emails, text messages or phone calls to deceive a victim. Phishing attacks exploit people, for example, misleading someone into clicking a…read more
Cyber Risks and Liabilities – May/June 2022
Spotting and Reporting Phishing Attacks Phishing is a form of social engineering attack that involves a cyber-criminal using scam emails, text messages or phone calls to deceive a victim. Phishing attacks exploit people, for example, misleading someone into clicking a…read more
Cyber Risks & Liability – Protecting Your Email
Email is a crucial part of everyday business, from direct customer support to internal management. However, businesses must be mindful that a successful email platform starts with basic principles of email security. It’s vital for businesses to ensure the privacy…read more
Cyber Risks and Liabilities – May/June 2022
Spotting and Reporting Phishing Attacks Phishing is a form of social engineering attack that involves a cyber-criminal using scam emails, text messages or phone calls to deceive a victim. Phishing attacks exploit people, for example, misleading someone into clicking a…read more
Cyber Risks & Liability – Protecting Your Email
Email is a crucial part of everyday business, from direct customer support to internal management. However, businesses must be mindful that a successful email platform starts with basic principles of email security. It’s vital for businesses to ensure the privacy…read more
Accountants, Tax Avoidance and PII
HMRC currently published a list of approximately 80 tax avoidance schemes, promoters, enablers and suppliers, recognising that this list is not exhaustive and that there are others that it cannot publish currently information about others. There have of course been other…read more
Cyber Risks and Liabilities – May/June 2022
Spotting and Reporting Phishing Attacks Phishing is a form of social engineering attack that involves a cyber-criminal using scam emails, text messages or phone calls to deceive a victim. Phishing attacks exploit people, for example, misleading someone into clicking a…read more
Accountants, Tax Avoidance and PII
HMRC currently published a list of approximately 80 tax avoidance schemes, promoters, enablers and suppliers, recognising that this list is not exhaustive and that there are others that it cannot publish currently information about others. There have of course been other…read more
The Phase 2 Grenfell Report
The Phase 2 Grenfell Report makes difficult reading for not just the construction market but in particular, architects and those carrying out architectural services. Not only was the report clear in its condemnation of the architect “Studio E”, but it…read more