Advertise on DCNN Advertise on DCNN Advertise on DCNN

Cyber Security


Veeam releases new Veeam Data Platform
Veeam Software has introduced the new Veeam Data Platform, a platform delivering advanced data security, recovery and hybrid cloud capabilities. The Veeam Data Platform, which includes Veeam Backup and Replication (VBR) v12, provides secure backup and fast reliable recovery that keeps business running. It brings together the latest features offered from Veeam into a single solution that is offered in three enterprise-grade editions for protecting cloud, virtual, physical, SaaS and Kubernetes applications across complex and expanding IT environments, and the increasing set of challenges facing every organisation from outages to errors and ransomware. Veeam Data Platform delivers the three key requirements to keep a business running: data security, data recovery and data freedom to back up and use data from anywhere without platform or cloud lock-in. There are three enterprise-grade editions: Foundation, Advanced and Premium. All editions contain Veeam’s VBR and Instant Recovery; Advanced and Premium editions also deliver advanced resiliency features including monitoring, analytics and recovery. • Foundation Edition offers complete data protection with VBR v12, which adds more than 500 new features and enhancements. • Advanced Edition combines VBR with Veeam ONE to give customers intelligent monitoring and observability to identify and resolve any backup or recovery problems before they begin. • Premium Edition offers enterprise Modern Data Protection and recovery capabilities as the premier offering - with VBR, ONE and Veeam Recovery Orchestrator (VRO). Building on the other editions, Premium adds the full automation of complex data recovery process with near-zero Recovery Point Objectives (RPOs) while automating testing and providing complete data resiliency with the confidence of one click recovery. Premium edition customers are also eligible for the new Veeam Ransomware Warranty which covers the cost of data recovery, up to $5 million, in the event of a ransomware or cyber attack. “Organisations are more vulnerable than ever. Over the past 12 months, 85% of organisations were attacked at least once - up from 76%,” says Danny Allan, CTO and Senior Vice President of Product Strategy at Veeam. “We understand IT leaders feel they aren’t sufficiently protected and as IT environments continue to grow more complex and demanding, it’s now obvious that Modern Data Protection must be integrated into the overall ‘cyber preparedness’ plan. The Veeam Data Platform brings the best of Veeam solutions together to deliver a single platform with relentless security, reliable data recovery and trusted data freedom, and is designed to give our customers the choice to leverage the right solution that fits their needs and keeps their business running.”  All editions of Veeam Data Platform leverage the latest backup and recovery technology of VBR v12 as its foundation. New functionality that advances enterprise-grade recovery capabilities ensures confidence in the face of disaster or cyber attacks across the hybrid cloud, including: • New Direct-to-object storage backups: take full advantage of the unlimited scalability of on-premises and cloud object storage without sacrificing performance. Send backups directly to Veeam’s ecosystem of object storage partners on-premises with the performance needed to meet goals or backup your edge locations directly to cloud object storage. • Immutability for every workload: ensure backups can always be restored after a cyber attack with comprehensive, enterprise-grade immutability options, including on-premises object, block and file storage, hardened repositories and deduplicating storage appliances, cloud object storage and tape. • Cyber resilient: enable the fastest response to ransomware attacks by identifying, alerting and restoring only clean data, including automation and proven recovery orchestration for all workloads. Empower a zero-trust journey with multi-factor authentication (MFA), password-less service accounts (gMSA) for Windows and single-use credentials for Linux, and fortify defence against cyber attacks with Kerberos-only and IPv6-only environment support. • Hybrid-cloud optimised: achieve even greater efficiency and security across the hybrid cloud with immutable backups for cloud-native AWS and Microsoft Azure workloads, new cloud-integrated agents for lift-and-shift workloads, and unified cloud monitoring and reporting. • Ecosystem Excellence: Veeam Universal Storage API 2.0 and new Smart Object Storage API provide even more future-proofing for enterprise scalability and offsite resiliency. Ecosystem vendors include Pure Storage, Scality and Object First as the inaugural launch partners that integrate with these new APIs. Veeam’s monitoring and analytics solution delivers intelligent insights and visibility within the NEW Veeam Data Platform Advanced and Premium Editions to help identify and resolve issues before problems arise, ensuring the highest protection of critical data. The latest version expands on new capabilities and includes support for more Veeam backup solutions (including Veeam Backup for Microsoft 365). Additionally, new monitoring and visibility capabilities include immutability reporting and data protection statuses for multi-cloud. These new advances deliver more value and insight into businesses’ data protection strategy than ever before. The new Veeam Data Platform Premium Edition also includes recovery orchestration, one of the most powerful tools to cut down time to recovery - delivering confidence in business resiliency. By automating planning, testing and orchestrating the steps needed to recover from a disaster, businesses can simplify operations and prove backup compliance. The Veeam Data Platform now delivers automated, orchestrated recovery to Microsoft Azure, instant restore of Veeam Agents backups as virtual machines (VMs), and an automated recovery rollback for clean, ransomware-free data recoveries. Platform extensions may be added to any of the Veeam Data Platform editions, or operated standalone, including backup for Kubernetes with Kasten K10 by Veeam, Veeam Backup for Microsoft 365, and Veeam Backup for Salesforce.

Exertis signs Veeam to cyber security portfolio
Exertis Enterprise has added Veeam Software to its portfolio - increasing its cyber security offering with a full range of solutions from the backup and recovery provider. The partnership is focused on opportunities in the UK, and Exertis is an official Veeam distributor. The vendor provides organisations with resiliency through data security, data recovery and data freedom for their hybrid cloud. The company offers a single platform for all workloads (cloud, virtual, physical, SaaS and Kubernetes) that gives businesses the peace of mind that their apps and data are protected, and always available so that they can keep their businesses running. Veeam’s software is infrastructure-agnostic, allowing for avoidance of proprietary hardware lock-in, thus optimising TCO and data mobility. “We are delighted to start this new partnership with Exertis Enterprise and welcome them as a distributor to the United Kingdom. Exertis Enterprise are demonstrated experts in cyber security, and as more businesses focus on the protection of their business-critical applications and data to provide cyber resiliency against ransomware attacks and cyber threats, it was a natural choice for us to begin this partnership together,” comments Alex Walsh, Channel and Alliances Director UKI, Veeam. Dominic Ryles, Director of Sales and Commercial - Security at Exertis Enterprise, says, “As the global impact of ransomware continues to rise exponentially, there is a fundamental need for organisations to secure their last line of defence by investing in advanced technologies that prepare for potential attacks. As a market-leader for the sixth time in the 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions, I’m excited to announce that we have joined forces with Veeam to deliver modern data protection to our channel partners, enabling them to use a single platform to own, control, and protect all of their customer data, anywhere, across all workloads. “This is an exciting addition as we continue to expand our cyber security portfolio to enable our channel partners with the most secure, advanced, and powerful solutions on the market to reduce downtime and data loss, whilst meeting stringent SLAs and generating an additional profitable revenue stream.”

Acronis seals cyber protection partnership with Fulham FC
Acronis has announced a three-year partnership with London´s oldest professional football club, Fulham FC. EveryCloud.co.uk will support Acronis as its delivery partner, providing its cutting-edge cyber protection solutions and cloud backup service to the club. Under EveryCloud.co.uk, Acronis will provide Premier League side Fulham FC with a full suite of cyber protection solutions. Arturs Banks, Head of IT of Fulham FC, says, “We are very pleased to be working with Acronis and EveryCloud.co.uk, and we look forward to incorporating them into our cloud backup and file security infrastructure. Its support and expertise will be invaluable to Fulham FC and the Fulham FC Foundation as we continue to prioritise data and cyber security at the club.” Ronan McCurtin, VP of Sales Europe, Israel and Turkey, Acronis, says, “We are proud to be partnering with Fulham FC, a club that understands the importance of keeping their data protected. With EveryCloud.co.uk we have the right partner who will support us in providing the team with a full suite of Acronis cyber protection solutions to protect the team's data assets and optimise data workflow, facilitating the team performing at its best both on and off the pitch.” Paul Richards, Director of Technology, EveryCloud.co.uk, adds, “EveryCloud.co.uk is delighted to partner with Fulham FC alongside our partner Acronis to deliver a complete suite of cyber protection services. Our proven track record of working with Acronis will enable Fulham FC to further protect their data, systems and infrastructure with the reliability and performance of Acronis’ products and services. Even the strongest defence needs backup.”

Macquarie renews security contract with Australian Tax Office
Macquarie Government has announced that it has renewed and extended its agreement with the Australian Taxation Office (ATO) to provide a range of data and cyber security services. It will see the ATO continue to leverage services including Macquarie’s Secure Internet Gateway (SIG), 24x7x365 Security Operations Centre (SOC), sovereign data centre, hyperconverged infrastructure, and cloud services. These services support the secure management of the connection between the ATO’s IT environment and the internet, and protect the financial, personal and sensitive data of Australian organisations and citizens. Since the initial agreement was signed in 2019, Macquarie has facilitated the migration of SIG services as well as supported the ATO’s IT and security teams in relation to SIG services. This support includes the monitoring of digital events on the ATO’s SIG and triage of targeted attacks by Macquarie’s SOC. For the ATO, Macquarie’s SOC provides a full inspection of internet traffic flows, content, and images to meet ATO policies, the government’s Protective Security Policy Framework (PSPF) and Information Security Manual (ISM) controls. Macquarie Government provides SIG and other cyber security services to approximately 42% of the government based on staff headcount. “We’re proud to play a key role in keeping one of Australia’s most fundamental government agencies secure, at a time when Australians are looking for greater assurance their critical government data and the institutions that store and protect it are fully secure,” says Aidan Tudehope, Managing Director, Macquarie Government.

ThreatSpike Red disrupts elite cyber security market
ThreatSpike has announced the launch of ThreatSpike Red, the industry’s first unlimited offensive cyber security service. ThreatSpike Red helps organisations of all sizes to close the cyber security gap by providing continuous unlimited testing and scanning of applications and websites to identify vulnerabilities. The new managed service is said to be the first of its kind to be offered on an affordable fixed-price basis, giving customers full visibility over cost, and making advanced offensive cyber security accessible to more organisations large and small. Compared to conventional pentesting conducted once or twice per year, ThreatSpike Red enables customers to undertake continuous cyber security evaluation, achieving greater depth through red team exercises that live-test defences. This helps companies take control of their cyber security posture, monitor performance, and respond to emerging threats to protect their businesses against cyber attacks and build customer trust. Adam Blake, CEO and co-founder of ThreatSpike, explains, “In today’s challenging digital environment offensive cyber security shouldn’t be just a point-in-time activity, but the high cost of traditional pentesting services means most organisations can only afford to test infrequently, if at all. This creates a high-risk cyber security gap where adversaries have a large window of opportunity to attack quickly. The results can be devastating, from loss of revenue and reputation to compliance failures and enterprise collapse. “ThreatSpike Red disrupts the traditional pentesting and cyber security services market by democratising access to offensive cyber security services through our transparent, fixed-price service. It means not only that more organisations can benefit from offensive cyber security, but also that they can protect their business on a continuous basis. In a difficult economic climate, our solution resolves the tension between security and cost at a time when managing both is critical to business success.” ThreatSpike Red is offered on a per-employee pricing basis for SMBs: • Companies with up to 250 employees: £5k per year • Companies with up to 1,000 employees: £10k per year • Companies with up to 2,000 employees: £15k per year    The service includes initial reconnaissance, vulnerability scanning, security assessment and reporting, together with unlimited red team attack exercises and penetration tests to stress-test systems and determine employee cyber threat awareness. ThreatSpike Red is delivered by ThreatSpike’s highly experienced team of security specialists using a combination of manual and automated approaches. ThreatSpike Red exceeds the requirements of NCSC Cyber Essentials certification, ensuring clients can demonstrate a robust approach to cyber security that gives customers confidence. Adam adds, “In our analysis of our work with hundreds of organisations, we’ve established that 70% of employees won’t report receiving a suspicious email to their security team. If a hacker gains access to a single machine in a company, there is a 90% chance it will result in a significant data breach, and the average company can be hacked and ransomed within a single day. On top of this, we find that companies are ill-prepared to respond to new threats and vulnerabilities, meaning they can be hacked before they even knew there was a risk. That’s why continuous offensive cyber security is so critical - it closes the gap and shrinks the window of opportunity for attackers. “By making offensive cyber security accessible to a larger group of organisations, ThreatSpike aims to help raise the level of cyber security performance across the board, limiting attacker opportunity and ensuring clients protect their customers, reputation, and revenues.”

Three steps to protect your organisation from wiper malware
By Florian Malecki, Executive Vice President of Marketing, Arcserve Wiper malware is an alarming threat to corporate data. Unlike ransomware, which can encrypt and disable your files until you pay a ransom, wiper malware aims to delete your data permanently and cause as much destruction as possible. Once it infects your system, it will make your data completely unrecoverable. This type of malware is hazardous because it offers no possibility of recovery by paying a ransom. Wiper malware has grown more common in recent years, with several high-profile attacks making headlines. The WannaCry attack in 2017, which affected hundreds of thousands of computers worldwide, is believed to have been a wiper attack. Other notable recent wiper attacks include Olympic Destroyer in 2018, targeted at the Winter Olympics in South Korea, and ZeroCleare in 2020, targeted at the energy and industrial sectors in the Middle East. Even the infamous Sony Pictures hack was a wiper attack. Wiper malware is also a weapon of cyber warfare. As the conflict between Russia and Ukraine continues, Ukraine has seen a withering barrage of wiper attacks. In the first half of 2022, seven new wiper variants were used in campaigns against private, government, and military organisations. Indeed, there have been wiper malware attacks in 24 countries beyond Ukraine, with some of these attacks targeting critical infrastructure using disk-wiping malware. One of the fundamental challenges in dealing with wiper threats is that they’re very often difficult to detect and contain. Unlike other forms of malware, which usually come with signs of their presence, wipers erase all traces of themselves once they have completed their destructive work. This makes it difficult for IT security professionals to respond to these attacks and prevent them from spreading. Organisations must implement robust, multi-layered security measures, including regular backups of critical data to defend against wiper threats. It’s also essential to maintain a strong security posture and be alert to signs of a potential wiper attack. Here are three steps your organisation can take to minimise your risk of falling victim to these destructive attacks: Backup your data The importance of backing up your data cannot be overstated when defending against wiper malware. While backups can’t prevent an attack from occurring, they provide a lifeline for restoring compromised data caused by wiper malware - or any other type of attack. By properly managing your backups, you can ensure you have copies of your data that are separate from your production systems. Should wiper malware, ransomware, or any other malware strike the active IT environment, your business can turn to its backups, stored on an immutable storage solution, for restoration. Not only is restoring from backups more cost-effective and faster than paying a ransom to recover data, but it’s likely your only recourse in a wiper attack because paying a ransom is usually not an option. Follow the 3-2-1-1 rule A 3-2-1-1 data-protection strategy is a best practice for defending against malware, including wiper attacks. This strategy entails maintaining three copies of your data, on two different media types, with one copy stored offsite. The final 1 in the equation is immutable object storage. By maintaining multiple copies of your data, you can ensure that you have a backup available in case one copy is lost or corrupted. It is imperative in the event of a wiper attack, which destroys or erases data. Storing your data on different media types also helps protect against wiper attacks. For example, you might keep one copy of your data on a hard drive, another at a cloud-based storage service, and the third on a removable drive or tape. This way, if one type of media is compromised, you still have access to your data through the other copies. Keeping at least one copy of your data offsite, either in a physical location or in the cloud, provides an additional layer of protection. If a wiper attack destroys on-site copies of your data, you’ll still have access to your off-site backup. The final advantage is immutable object storage. Immutable object storage involves continuously taking snapshots of your data every 90 seconds, ensuring that you can quickly recover it even during a wiper attack. This next-generation data-security tool helps to safeguard your information and protect it from loss or damage. Air gap your networks Air gapping is an efficient and effective method for protecting backup data against wiper attacks. There are two types of air gapping: traditional physical and logical air gapping. Physical air gapping involves disconnecting a digital asset from all other devices and networks, creating a physical separation between a secure network and any other computer or network. You can store backup data on media such as tape or disk, then completely disconnect these media from your production IT environment. Logical air gapping, on the other hand, relies on network and user access controls to isolate backup data from the production IT environment. Data is pushed to its intended destination, such as an immutable storage or custom appliance, through a one-way street and can only be managed or modified through separate authentication channels. The beauty of air gapping is that it renders your data almost invisible to wiper malware attacks, making it nearly impossible for the bad guys to compromise your backups. Final takeaway The increasing spread of wiper malware in the wild is a stark reminder of the dangerous landscape organisations face when protecting their data. A solid, well managed data backup and recovery plan is the key to ensuring data safety in the face of today’s growing array of threats. No matter what tactics cyber criminals may use to disrupt your access to your data, a robust backup and recovery plan will keep your data secure.

Six Degrees welcomes new advisor to its ranks
Six Degrees has appointed Chris Dunning-Walton to its advisory team. Chris joined the Six Degrees advisory team on 1 January 2023. Chris is currently CEO and Managing Partner of Sentients, a boutique international executive search firm that focuses on placing Chief Information Security Officers (CISOs) and other cyber leaders with FTSE 250 enterprises. He is also CEO of InfoSec People, a multi-award-winning cyber security recruitment consultancy, and the founder and Director of CyNam. Chris has worked with a number of premier brands including Admiral Insurance, Dixons, Carphone Warehouse, Aviva, The Economist, Vitality, BAE, BT Deloitte, and KPMG. Chris says, "Cyber threats present as the world's top business risk. It's important that businesses develop strategies that not only seek to improve their cyber security postures, but also their cyber resilience: how technology and processes enable the business to respond when incidents arise. What drew me towards Six Degrees was their exceptional people and portfolio of services, fronted by expertise in hybrid cloud technology and with security at the core of everything they do. I am excited to be working closely with the leadership team of a great business which is committed to enabling its clients to not only survive - but to thrive in these complex times." Commenting on the appointment, Six Degrees CEO Simon Crawley-Trice says, "With the economic outlook we're facing over the next few years, it's more imperative than ever that companies transform their digital strategies to be reliable, resilient and cost-effective. Security must be at the heart of any transformation. Chris has years of experience working with top FTSE brands, helping them to better understand the challenges before them, to mature their cyber strategies, and to secure a return on their cyber security investments. Chris is the right person to work with us as we strive to connect our clients with the solutions needed to protect and grow their businesses."

atNorth appoints Fredrik Jansson to its executive team
atNorth has announced the appointment of Fredrik Jansson to its executive team, as the next phase of significant growth for the business is initiated. Fredrik joins from STACK EMEA NORDICS (formerly DigiPlex) where he held several executive positions including Chief Commercial Officer, Chief Strategy Officer and Chief Marketing and Communications Officer. Under his leadership, DigiPlex’s marketing/communications transformation was internationally recognised by over 20 awards. In addition, Fredrik has been named as one of the 50 Most Influential CMOs globally, an IM100 awards winner and the first ever recipient of Datacloud Awards’ ‘Marketeer of the Year’. Before joining DigiPlex, Fredrik held several leadership roles at Tata Consultancy Services (TCS) in a distinguished career spanning over a decade and over 40 international awards for excellence. During his time with TCS, the firm grew from $1 billion to $16.5 billion in revenue, and from 40,000 to 370,000 employees. His last position at TCS was as Chief Brand Officer, responsible for all brand building activities across 21 European markets. Additionally, Fredrik is globally educated and holds a Master’s degree in Business with university studies in France (INSEAD), UK (London Business School), USA (Harvard, Kellogg; Northwestern and University of Florida), Ireland (Trinity College Dublin) and Sweden (Uppsala University). “Fredrik Jansson joins atNorth at a pivotal time, as the business has already achieved considerable growth in 2022. By bringing on one of the most awarded executives in the industry we aim to amplify our fast paced, ‘scale up’ environment and fuel the next stage of our expansion”, says Eyjólfur Magnús Kristinsson, CEO of atNorth. “Fredrik’s considerable experience in corporate and commercial strategy, as well as marketing and communication transformation, makes him uniquely positioned to help accelerate atNorth’s continued rapid expansion in the Nordic region.” “I am extremely excited to join atNorth, a disruptive force in the world's most advantageous locations for data centres - the Nordics. At this focal point, where the two defining trends of our time - digitalisation and sustainability - meet in the data centre it is clear that there is considerable opportunity for further progression,” says Fredrik. “I am looking forward to working with atNorth’s world class leadership team and fantastic employees in fuelling the next chapter of rapid growth for the business”. atNorth is experiencing strong growth following the opening of its SWE01 data centre in Stockholm in 2022 and the recent acquisition of two data centres from Advania in Finland. The company now operates five data centres in strategic locations across three Nordic countries, with a sixth site to open in Akureyri, Iceland in Q2, 2023.

Vívaro Telecom teams up with MDC Data Centers in San Diego
MDC Data Centers has announced that its new data centre in San Diego will be ready to begin operations in Q2 of 2023. This new location is announced in partnership with Vívaro Telecom, a major Mexican network leader in telecommunications, media, IT solutions, and cyber security with more than 55 years of operations. The new data centre will become the first of its kind in Southern California, and will provide redundant access to the company's fibre-crossing solutions that connect San Diego to the state of Baja California in Mexico with two independent routes, via Otay Mesa and via San Ysidro. With a model proven in different markets, MDC San Diego enters into agreements with new founding members of the site to foster more interconnections to the border and bring better connectivity between the two countries. A data centre built for its customers During an annual customer appreciation event held in Mexico, Juan Salazar, CEO of MDC Data Centers, announced the beginning of physical and technical adaptations at the company's new facility in San Diego, California. Juan expressed his gratitude for the trust shown by MDC Data Centers' customers, and emphasised his commitment to turn MDC San Diego into a neutral interconnection point at the border. Vívaro Telecom joins MDC San Diego as a founding member, highlighting the importance of the site in covering Baja California's need for interconnection and developing solutions that allow breaking the technological isolation of the state with the centre of Mexico. "At Vívaro Telecom, we believe that this new facility is a reflection of MDC Data Centers' commitment to neutrality and customer-centricity. It will expand the company's unique business advocacy to a new strategic market, creating new business opportunities for all participants in the ecosystem," says Gustavo Mario De la Garza Flores, CEO of Vívaro. San Diego is a hub for technology and innovation, but also a key element in MDC Data Centers' strategy to continue promoting its border platform. The new site will provide the infrastructure needed for its customers' growth in local and international markets.

IT industry revealed as the least cyber-secure industry in the UK
The UK IT sector has the highest number of data breaches of any industry, with over 300,000 cyber security breaches in the past year alone. And, with photo sharing apps such as BeReal and Snapchat on the rise, the potential for severe data breaches when these apps are used at work is creating panic across many UK industries. Interested in identifying the sectors most at risk, the experts at Scams.info used data from the 2022 Cyber Security Breaches Survey to identify the UK industries with the most cyber security breaches. Key findings: • The information and communication (IT) industry is the least cyber-secure in the UK, hitting the top ranking with 320,060 data breaches in 2022, and 66.17 average breaches per employee. • The food and hospitality sector is the most cyber-secure, with 5,176 breaches - 60 times less than the IT industry. The UK industry with the most cybersecurity breaches in 2022 RankIndustryNumber of data breaches in the past yearAverage no. breaches per employee1Information/communication320,06066.172Finance/insurance305,78518.453Retail/wholesale (including vehicle sales and repairs)183,50011.514Transport/storage111,6544.985Education106,3658.046Utilities/production55,8623.107Construction54,84711.568Professional, scientific/technical8,3700.519Health, social care/social work7,0100.4210 Entertainment, service/membership organisations6,2380.8511 Administration5,6740.0512Food/hospitality5,1760.04 According to Scams.info, IT employees are over three times as likely to suffer a cyber security breach than those in the finance and insurance industry (18.45 average breaches). This adds up to IT employees potentially suffering cyber breaches at least once per week each, on average. Food and hospitality industry is the most cyber-secure Scams.info also found that, in 12th place, the food and hospitality industry is the most cyber-secure of all sectors observed, with only 5,176 data breaches in the past year, equating to a miniscule 0.04 breaches per employee. This is a 314,884 drop in data breaches when compared to the IT sector, and 498 fewer annual breaches than the administration and real estate sector in 11th place. Web development and cyber security expert, Ledi Sallilari, from the SEO consulting firm Reboot, offered the following tips on the best ways businesses and employees to protect themselves from data breaches at work: • For tech and remote-based industries, the importance of cyber security training is invaluable. Implementing safe practices when working online can play a vital part in keeping the data of your company, clients and employees safe from attack. • The main cause of online security breaches can be largely put down to human error. Avoid easily guessable passwords that use identifying information (such as your dog’s name), and opt for the longest passwords possible. If there is an option for your password to be between eight and 24 characters, go for 24. • Be aware of phishing attacks, and do not open any emails you do not recognise. Some hackers may even impersonate your boss, so it’s always best to double check directly with the alleged sender themselves before actioning anything from a suspicious email.



Translate »