Email fraud – how much of a risk is it posing to businesses?

Since 2003, the FBI has published numerous press releases every year warning of increasingly sophisticated email scams/email fraud targeting high-end firms.  By sending emails that spoof executives working at a firm, hackers are able to convince the firm to send unauthorized international and national wire transfers involving large amounts of money.  In fact, the FBI reports email fraud affected over 7,000 companies and cost these firms $750 billion between 2013 and 2015.

What is CEO Fraud?

Also referred to as business email compromise scams (BEC scams), CEO fraud begins with CEO email hack professionals phishing managers to gain access to their inbox.  They may also phish employees from a domain that appears to be from a company executive.  For example, a CEO email hacker might take a firm’s true domain URL –www.firmdomainname.com– and insert a negligible letter or number that would be easily looked over, such as www.firmdomainename.com.… Read more

Read More

Superior Security: 4 High-Tech Ways to Keep Your Business Safe


Running a business is an inherently risky venture. However, there are far more risks to businesses today than things like market forces and stiff competition.

Many of these threats can be completely unexpected and can strike at any time. Curbing the danger posed by things like burglars, hackers and malware requires making investments in technology. Below are four high-tech ways you can keep your business safe.

1. Encryption

One of the most serious threats to businesses today is the threat posed by hackers and cyber criminals. Business data suggests that a 2017 hacking cost the average company $1.3 million. If you want to prevent these kinds of losses, you need to protect your data.

Data encryption converts your data into a code, so that if it is downloaded from an outside source without the proper decryption software, it is appears to simply be strings of meaningless characters. In other words, … Read more

Read More

Ethiopian Nile dam to destroy about half of Egypt’s agriculture

When you think of the Nile, what comes to mind? Egyptian cotton, Baby Moses in a bassinet, waiting among the reeds to be found and brought into the Pharaoh’s palace, a Nile cruise along the riverbanks? An ancient and modern empire?  These things might come to mind if you are sitting on your couch somewhere in the west reading this.

felucca boat, nile cruise

If you are from Ethiopia, Sudan or Egypt your concerns are very different. And they could spell life and death, prosperity or war. And this is a serious time and the world needs to get involved, especially those funding renewable energy projects:

Ethiopia is about to finish the largest hydro-electric dam in Africa and the 7th largest in the world. It’s called the Grand Ethiopian Renaissance Dam (GERD). We have been writing about the dam for years. But now world leaders are paying attention because the dam is … Read more

Read More

Encryption, control, security… Jumble for MS Outlook

Jumble for MS Outlook

Version 3.1 of Jumble for Outlook has now been released, which means we have a lot of exciting new features and updates to share with you. Outlook is still one of the most popular email clients used by businesses, and we support all versions from Outlook 2010 through to Outlook 2016.

Let’s have a look at what the development team have been up to in the latest release…

Full control over your sent emails with Revoke & Expire

Revoke an Email in MS Outlook:

Users now have the power to revoke an email at any time, giving you complete control over your sent items. So if you have sent an email to the wrong person, you can instantly revoke it by going into your sent items and clicking ‘Revoke Email’. It’s as simple as that! The email is instantly revoked meaning the recipient will no … Read more

Read More

Hack Attack: 5 Ways to Identify a Web Security Intrusion


Detecting intrusions of your network can sometimes be difficult. You can’t assume it’s a big, catastrophic event.

In fact, hackers would prefer that you never notice at all. Here are five signs to be on the lookout for.

Your Firewalls or Anti-virus Software Are Disabled

If you find that they’re been turned off, it may be the first sign that a hacker is at work. With these disabled, a hacker can freely probe your system for weaknesses. The first time it happens you may assume it’s an application glitch. But you should disconnect from the internet and run a security scan to be safe.

Passwords Have Changed

If you find that any passwords to your online accounts no longer work, you may have been hacked. They can be stolen by phishing emails, key-trapping spyware, or even guessed based on your social media posts. Once they have access, hackers … Read more

Read More