Increasingly individuals are being encouraged, usually through an Email or SMS, to sign into a commonly used service (for example their Apple or Google accounts) and the login page is a fake. If you enter your details you will find your account has been compromised as your logon details are passed on to someone else. Here we explain about this kind of attack, what to do to avoid it and what to do if you have fallen victim to it.
5 Aug 2016 • 76 views
You may receive an Email, claiming to be from Microsoft, advising that there has been an unusual signin to your Microsoft account. This fake message, based on a genuine notification from Microsoft, by its nature encourages you to check this activity but in doing so it directs you to a fake site to log in to your Microsoft account.
12 Jul 2016 • 76 views
In a new variation on the phishing scam, you may receive a text message, claiming to be from Apple Support, with your name and advising that your Apple ID has been deactivated and that you need to confirm the ID to prevent deletion.
11 Apr 2016 • 76 views
One in three people don't set a password on their phone. We know you of course have a password on your phone but just in case keeping yourself one step ahead of the next threat or avoiding those currently doing the rounds is all about these few common sense precautions.
11 Feb 2016 • 76 views
On a day to day basis you may find your CJSM account locked for no particular reason. Here we explain a bit more about what is happening and what you can do.
4 Feb 2016 • 76 views
"Man in the Middle" attacks are on the rise with fraudsters making a B line straight to your financial staff. Have you got measures in place to defend against this type of fraud?
14 Jan 2016 • 76 views
Whatever you use CJSM for you are bound by it's terms and conditions but have you actually read them? Do you know what your responsibilities and obligations are? Not sure? Here you can find links to the Terms & Conditions and we have also highlighted a few things of particular importance.
12 Nov 2015 • 76 views
Those keen to get you to divulge your personal/financial information are always looking for new ways to get you reading and responding to their E-mails. Spam filters do a great job and will block the majority of spam and fake messages but inevitably some still gets through. Here we explain some of the things to look for to help you spot the fake messages from the genuine.
15 Jul 2014 • 76 views
Fraudsters are constantly looking for new ways to get you to part with your money and one common trick is to call claiming to be from Microsoft or Apple and to help you fix a "problem" on your computer. Find out more about they are up to and how to avoid being caught out.
12 Feb 2014 • 76 views
For those who are late to class "phishing" is the use of fraudulent (but plausible looking) emails and websites which try to persuade the gullible to hand over their bank or credit card details to criminals.ï¿½ Here we briefly explain how to recognise the phishing attempts and you need to be doing to prevent them getting to you.
2 Sep 2013 • 76 views
We cannot empahsise strongly enough how important it is that you set a good passcode on your iPhone or iPad - more than just simply 4 digits (though this is better than no passcode at all). Here we show you how to set a good passcode and also configure your device to erase itself should too many attempts be made.
23 Mar 2012 • 76 views
It is strongly recommended that you have your computer encrypted to keep the contents secure in the event that it is lost or stolen and here we explain what your options are.
27 Feb 2012 • 76 views
Being able to communicate securely with Government agencies is rapidly becoming a pre-requisite for handling work from or for such agencies. If you are new to CJSM then here we explain how it works for 15 New Bridge Street.
27 Feb 2012 • 76 views