All Posts

How to Tackle Cyberbullying

How to Tackle Cyberbullying

Although the actual act of cyberbullying is not a crime there are other laws that can tackle these cruel cyberattacks that can cause mental anguish to young children and teenagers and adults, costing the UK economy £2bn every year due to loss of productivity and sick pay leave. Rather than wait for it to reach the stage of having the…

Read more

Beware the Risk of Ransomware

Beware the Risk of Ransomware

You might have heard about it in the news or even got wind of it in the office, but the only thing most of us know is that it is one of the arch enemies of our computers or operating systems. Ransomware is as malevolent as it sounds. This malware method of cybercrime stops you accessing your files unless you…

Read more

Tell-Tale Signs You’ve Been Hacked

Tell-Tale Signs You’ve Been Hacked

There are a number of ways cyber criminals can burglarise your computer and there are tell tale signs that will pop up to warn you that you are not alone. Fake antivirus messages, sudden appearance of unsolicited toolbars and redirected internet searches are just a few ways fraudsters have broken into your system to make mischief. Bogus antivirus messages These…

Read more

How to Avoid a QR Code Scam

How to Avoid a QR Code Scam

Online opportunists have wasted no time in sussing how to use QR codes to commit cybercrime. As quick as counting to three, this way they can access your personal details and use them in a number of ways that can wreak havoc. Fake QR codes are increasingly creating chaos with regular reports of unsuspecting users finding a zero balance on…

Read more

The Economic Value of Digital Identification

The Economic Value of Digital Identification

The value of digital ID verification is well known and proven by and for governments, border agencies and large financial institutions. In terms of national and financial security, robust ID checks keep whole populations and economies safe, in a very real way. What is perhaps not so well appreciated is the actual economic value that digital identification brings with it.…

Read more

Keep your identity to yourself

Keep your identity to yourself

Gone are the days when forging someone else’s signature was the most common form of identity theft, but these days this art of impersonation has found far easier routes and these don’t always involve illegal online operations. Closer than you think Hacking or exploiting a computer system is probably the hardest for the crooks to crack. These crimes are often…

Read more

Selfies Struggling to Gain Security Status

Selfies Struggling to Gain Security Status

In the age of the selfie, it makes sense for many members of the online ID verification community that they be part of the onboarding process. With timestamps and high quality digital images, there is a strong argument that a selfie can be a legitimate element of the verification process. This is especially true if applicants have limited access to…

Read more

Be Gone Phishing

Be Gone Phishing

You might have heard of this new phrase on the cyber block but have never really understood what it meant. Phishing is as flaky as it sounds – it is a fraudulent attempt to obtain sensitive data such as usernames, passwords and credit card details under the guise of a trusted entity via electronic communication. Electronic communication is by and…

Read more